input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:46.207Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:47.387Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t142.237.228.117\n\tSource Port:\t\t40214\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.237.228.117","IpPort":"40214","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524055643,"task":"Logon"}}
{ "action": "Logon", "clientport": 40214, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-06T18:47:46.207Z\",\"agent\":{\"ephemeral_id\":\"f1be155c-635c-4c98-be91-3a2982bce2ec\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-06T18:47:47.387Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t142.237.228.117\\n\\tSource Port:\\t\\t40214\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"142.237.228.117\",\"IpPort\":\"40214\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2448}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6524055643,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6524055643", "streamName": "microsoft-windows-security-auditing", "clientIP": "142.237.228.117", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:46.207Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:47.387Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t142.237.228.117\n\tSource Port:\t\t40214\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.237.228.117","IpPort":"40214","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524055643,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:46.207Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:47.387Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t142.237.228.117\n\tSource Port:\t\t40214\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.237.228.117","IpPort":"40214","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524055643,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 40214 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6524055643 streamName: microsoft-windows-security-auditing clientIP: 142.237.228.117 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t105.122.17.132\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"105.122.17.132","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
{ "action": "Logon", "clientport": 36224, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-06T18:47:22.009Z\",\"agent\":{\"ephemeral_id\":\"f1be155c-635c-4c98-be91-3a2982bce2ec\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-06T18:47:23.007Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t105.122.17.132\\n\\tSource Port:\\t\\t36224\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"105.122.17.132\",\"IpPort\":\"36224\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2448}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6524054336,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6524054336", "streamName": "microsoft-windows-security-auditing", "clientIP": "105.122.17.132", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t105.122.17.132\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"105.122.17.132","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t105.122.17.132\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"105.122.17.132","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 36224 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6524054336 streamName: microsoft-windows-security-auditing clientIP: 105.122.17.132 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t147.83.242.73\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"147.83.242.73","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
{ "action": "Logon", "clientport": 36224, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-06T18:47:22.009Z\",\"agent\":{\"ephemeral_id\":\"f1be155c-635c-4c98-be91-3a2982bce2ec\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-06T18:47:23.007Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t147.83.242.73\\n\\tSource Port:\\t\\t36224\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"147.83.242.73\",\"IpPort\":\"36224\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2448}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6524054336,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6524054336", "streamName": "microsoft-windows-security-auditing", "clientIP": "147.83.242.73", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t147.83.242.73\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"147.83.242.73","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t147.83.242.73\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"147.83.242.73","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 36224 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6524054336 streamName: microsoft-windows-security-auditing clientIP: 147.83.242.73 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t142.236.134.48\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.236.134.48","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
{ "action": "Logon", "clientport": 36224, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-06T18:47:22.009Z\",\"agent\":{\"ephemeral_id\":\"f1be155c-635c-4c98-be91-3a2982bce2ec\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-06T18:47:23.007Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t142.236.134.48\\n\\tSource Port:\\t\\t36224\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"142.236.134.48\",\"IpPort\":\"36224\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2448}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6524054336,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6524054336", "streamName": "microsoft-windows-security-auditing", "clientIP": "142.236.134.48", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t142.236.134.48\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.236.134.48","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t142.236.134.48\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.236.134.48","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 36224 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6524054336 streamName: microsoft-windows-security-auditing clientIP: 142.236.134.48 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t170.110.231.77\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"170.110.231.77","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
{ "action": "Logon", "clientport": 36224, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-06T18:47:22.009Z\",\"agent\":{\"ephemeral_id\":\"f1be155c-635c-4c98-be91-3a2982bce2ec\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-06T18:47:23.007Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t170.110.231.77\\n\\tSource Port:\\t\\t36224\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"170.110.231.77\",\"IpPort\":\"36224\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2448}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6524054336,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6524054336", "streamName": "microsoft-windows-security-auditing", "clientIP": "170.110.231.77", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t170.110.231.77\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"170.110.231.77","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-06T18:47:22.009Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-06T18:47:23.007Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t170.110.231.77\n\tSource Port:\t\t36224\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"170.110.231.77","IpPort":"36224","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6524054336,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 36224 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6524054336 streamName: microsoft-windows-security-auditing clientIP: 170.110.231.77 userName: $
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"69.253.242.223","externalIp":"218.108.60.200","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=69.253.242.223 ::: serverIP=218.108.60.200 ::: userName=nighthawk ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":1212775342,\"originType\":\"AD Users\",\"internalIp\":\"69.253.242.223\",\"externalIp\":\"218.108.60.200\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-04T17:07:08.000Z\"} ::: clientIP=69.253.242.223 ::: serverIP=218.108.60.200 ::: userName=nighthawk ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-04T17:07:08.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "69.253.242.223", "serverIP": "218.108.60.200", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"69.253.242.223","externalIp":"218.108.60.200","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=69.253.242.223 ::: serverIP=218.108.60.200 ::: userName=nighthawk ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"69.253.242.223","externalIp":"218.108.60.200","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=69.253.242.223 ::: serverIP=218.108.60.200 ::: userName=nighthawk ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-04T17:07:08.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 69.253.242.223 serverIP: 218.108.60.200 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"248.61.182.245","externalIp":"47.147.117.73","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=248.61.182.245 ::: serverIP=47.147.117.73 ::: userName=alice ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":1212775342,\"originType\":\"AD Users\",\"internalIp\":\"248.61.182.245\",\"externalIp\":\"47.147.117.73\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-04T17:07:08.000Z\"} ::: clientIP=248.61.182.245 ::: serverIP=47.147.117.73 ::: userName=alice ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-04T17:07:08.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "248.61.182.245", "serverIP": "47.147.117.73", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"248.61.182.245","externalIp":"47.147.117.73","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=248.61.182.245 ::: serverIP=47.147.117.73 ::: userName=alice ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"248.61.182.245","externalIp":"47.147.117.73","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=248.61.182.245 ::: serverIP=47.147.117.73 ::: userName=alice ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-04T17:07:08.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 248.61.182.245 serverIP: 47.147.117.73 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"17.31.183.89","externalIp":"4.247.149.16","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-03T20:28:42.000Z"} ::: clientIP=17.31.183.89 ::: serverIP=4.247.149.16 ::: userName=johndoe ::: created_at=2023-04-03T20:28:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T20:28:42.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "thedailyquiz.com", "message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"17.31.183.89\",\"externalIp\":\"4.247.149.16\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-03T20:28:42.000Z\"} ::: clientIP=17.31.183.89 ::: serverIP=4.247.149.16 ::: userName=johndoe ::: created_at=2023-04-03T20:28:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T20:28:42.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "thedailyquiz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-04-03T20:28:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "17.31.183.89", "serverIP": "4.247.149.16", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"17.31.183.89","externalIp":"4.247.149.16","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-03T20:28:42.000Z"} ::: clientIP=17.31.183.89 ::: serverIP=4.247.149.16 ::: userName=johndoe ::: created_at=2023-04-03T20:28:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T20:28:42.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"17.31.183.89","externalIp":"4.247.149.16","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-03T20:28:42.000Z"} ::: clientIP=17.31.183.89 ::: serverIP=4.247.149.16 ::: userName=johndoe ::: created_at=2023-04-03T20:28:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T20:28:42.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: thedailyquiz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: thedailyquiz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-04-03T20:28:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwarePhishing streamName: OpenDNS Detection clientIP: 17.31.183.89 serverIP: 4.247.149.16 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.195.1.131","externalIp":"76.148.205.158","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T20:28:42.000Z"} ::: clientIP=35.195.1.131 ::: serverIP=76.148.205.158 ::: userName=janedoe ::: created_at=2023-04-03T20:28:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T20:28:42.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "thedailyquiz.com", "message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"35.195.1.131\",\"externalIp\":\"76.148.205.158\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-03T20:28:42.000Z\"} ::: clientIP=35.195.1.131 ::: serverIP=76.148.205.158 ::: userName=janedoe ::: created_at=2023-04-03T20:28:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T20:28:42.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "thedailyquiz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-04-03T20:28:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "35.195.1.131", "serverIP": "76.148.205.158", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.195.1.131","externalIp":"76.148.205.158","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T20:28:42.000Z"} ::: clientIP=35.195.1.131 ::: serverIP=76.148.205.158 ::: userName=janedoe ::: created_at=2023-04-03T20:28:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T20:28:42.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.195.1.131","externalIp":"76.148.205.158","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T20:28:42.000Z"} ::: clientIP=35.195.1.131 ::: serverIP=76.148.205.158 ::: userName=janedoe ::: created_at=2023-04-03T20:28:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T20:28:42.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: thedailyquiz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: thedailyquiz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-04-03T20:28:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwarePhishing streamName: OpenDNS Detection clientIP: 35.195.1.131 serverIP: 76.148.205.158 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"177.67.124.10","externalIp":"224.37.236.7","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=177.67.124.10 ::: serverIP=224.37.236.7 ::: userName=alice ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":1212775342,\"originType\":\"AD Users\",\"internalIp\":\"177.67.124.10\",\"externalIp\":\"224.37.236.7\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-04T17:07:08.000Z\"} ::: clientIP=177.67.124.10 ::: serverIP=224.37.236.7 ::: userName=alice ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-04T17:07:08.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "177.67.124.10", "serverIP": "224.37.236.7", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"177.67.124.10","externalIp":"224.37.236.7","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=177.67.124.10 ::: serverIP=224.37.236.7 ::: userName=alice ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"177.67.124.10","externalIp":"224.37.236.7","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=177.67.124.10 ::: serverIP=224.37.236.7 ::: userName=alice ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-04T17:07:08.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 177.67.124.10 serverIP: 224.37.236.7 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"60.51.228.171","externalIp":"255.206.0.236","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=60.51.228.171 ::: serverIP=255.206.0.236 ::: userName=bob ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":1212775342,\"originType\":\"AD Users\",\"internalIp\":\"60.51.228.171\",\"externalIp\":\"255.206.0.236\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-04T17:07:08.000Z\"} ::: clientIP=60.51.228.171 ::: serverIP=255.206.0.236 ::: userName=bob ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-04T17:07:08.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "60.51.228.171", "serverIP": "255.206.0.236", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"60.51.228.171","externalIp":"255.206.0.236","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=60.51.228.171 ::: serverIP=255.206.0.236 ::: userName=bob ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":1212775342,"originType":"AD Users","internalIp":"60.51.228.171","externalIp":"255.206.0.236","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-04T17:07:08.000Z"} ::: clientIP=60.51.228.171 ::: serverIP=255.206.0.236 ::: userName=bob ::: created_at=2023-05-04T17:07:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-04T17:07:08.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-04T17:07:08.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 60.51.228.171 serverIP: 255.206.0.236 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"211.236.194.86","externalIp":"178.119.59.200","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=211.236.194.86 ::: serverIP=178.119.59.200 ::: userName=bob ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.meiersupply.com", "message": "WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={\"originId\":1121098278,\"originType\":\"AD Users\",\"internalIp\":\"211.236.194.86\",\"externalIp\":\"178.119.59.200\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"www.meiersupply.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-06-06T16:33:15.000Z\"} ::: clientIP=211.236.194.86 ::: serverIP=178.119.59.200 ::: userName=bob ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.meiersupply.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-06T16:33:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "211.236.194.86", "serverIP": "178.119.59.200", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"211.236.194.86","externalIp":"178.119.59.200","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=211.236.194.86 ::: serverIP=178.119.59.200 ::: userName=bob ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"211.236.194.86","externalIp":"178.119.59.200","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=211.236.194.86 ::: serverIP=178.119.59.200 ::: userName=bob ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.meiersupply.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.meiersupply.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-06T16:33:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareBusiness and Industry streamName: OpenDNS Detection clientIP: 211.236.194.86 serverIP: 178.119.59.200 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"114.73.79.65","externalIp":"107.208.23.73","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=114.73.79.65 ::: serverIP=107.208.23.73 ::: userName=janedoe ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.meiersupply.com", "message": "WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={\"originId\":1121098278,\"originType\":\"AD Users\",\"internalIp\":\"114.73.79.65\",\"externalIp\":\"107.208.23.73\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"www.meiersupply.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-06-06T16:33:15.000Z\"} ::: clientIP=114.73.79.65 ::: serverIP=107.208.23.73 ::: userName=janedoe ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.meiersupply.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-06T16:33:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "114.73.79.65", "serverIP": "107.208.23.73", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"114.73.79.65","externalIp":"107.208.23.73","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=114.73.79.65 ::: serverIP=107.208.23.73 ::: userName=janedoe ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"114.73.79.65","externalIp":"107.208.23.73","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=114.73.79.65 ::: serverIP=107.208.23.73 ::: userName=janedoe ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.meiersupply.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.meiersupply.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-06T16:33:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareBusiness and Industry streamName: OpenDNS Detection clientIP: 114.73.79.65 serverIP: 107.208.23.73 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"7.8.40.232","externalIp":"2.188.255.143","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=7.8.40.232 ::: serverIP=2.188.255.143 ::: userName=janedoe ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.meiersupply.com", "message": "WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={\"originId\":1121098278,\"originType\":\"AD Users\",\"internalIp\":\"7.8.40.232\",\"externalIp\":\"2.188.255.143\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"www.meiersupply.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-06-06T16:33:15.000Z\"} ::: clientIP=7.8.40.232 ::: serverIP=2.188.255.143 ::: userName=janedoe ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.meiersupply.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-06T16:33:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "7.8.40.232", "serverIP": "2.188.255.143", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"7.8.40.232","externalIp":"2.188.255.143","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=7.8.40.232 ::: serverIP=2.188.255.143 ::: userName=janedoe ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"7.8.40.232","externalIp":"2.188.255.143","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=7.8.40.232 ::: serverIP=2.188.255.143 ::: userName=janedoe ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.meiersupply.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.meiersupply.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-06T16:33:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareBusiness and Industry streamName: OpenDNS Detection clientIP: 7.8.40.232 serverIP: 2.188.255.143 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"24.122.179.194","externalIp":"250.106.0.242","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=24.122.179.194 ::: serverIP=250.106.0.242 ::: userName=bob ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.meiersupply.com", "message": "WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={\"originId\":1121098278,\"originType\":\"AD Users\",\"internalIp\":\"24.122.179.194\",\"externalIp\":\"250.106.0.242\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"www.meiersupply.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-06-06T16:33:15.000Z\"} ::: clientIP=24.122.179.194 ::: serverIP=250.106.0.242 ::: userName=bob ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.meiersupply.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-06T16:33:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "24.122.179.194", "serverIP": "250.106.0.242", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"24.122.179.194","externalIp":"250.106.0.242","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=24.122.179.194 ::: serverIP=250.106.0.242 ::: userName=bob ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.meiersupply.com ::: action=BLOCKED ::: message={"originId":1121098278,"originType":"AD Users","internalIp":"24.122.179.194","externalIp":"250.106.0.242","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"www.meiersupply.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-06-06T16:33:15.000Z"} ::: clientIP=24.122.179.194 ::: serverIP=250.106.0.242 ::: userName=bob ::: created_at=2023-06-06T16:33:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-06-06T16:33:15.000Z ::: serverHostname=www.meiersupply.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.meiersupply.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.meiersupply.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-06T16:33:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareBusiness and Industry streamName: OpenDNS Detection clientIP: 24.122.179.194 serverIP: 250.106.0.242 userName: bob
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk","recipient":["ataylor@umbrella.bank"],"senderIP":"42.207.128.0","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=42.207.128.0 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=42.207.128.0 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk", "emailsendingserver": "69.72.42.1", "emailsubject": "Annual Leave Compliance Report for 2023 Matters Arisen", "filehash": "<20231108090308.9DE74CBBDC71A6CE@gmx.de>", "filename": "from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatTime\":\"2023-11-08T08:46:21.000Z\",\"threat\":\"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatTime\":\"2023-11-08T08:45:26.000Z\",\"threat\":\"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-08T09:03:09.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Annual Leave Compliance Report for 2023 Matters Arisen \",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4003,\"headerFrom\":\"HR Department <rolcauhengranfj@gmx.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"rolcauhengranfj@gmx.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"ataylor@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad\",\"md5\":\"daa648df8951cefe9a71b3859d4bb89c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"29341035-38f7-c690-267e-1a2d1eb65f07\",\"QID\":\"3u7w6n06hb-1\",\"GUID\":\"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy\",\"sender\":\"bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk\",\"recipient\":[\"ataylor@umbrella.bank\"],\"senderIP\":\"42.207.128.0\",\"messageID\":\"<20231108090308.9DE74CBBDC71A6CE@gmx.de>\"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=42.207.128.0 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=42.207.128.0 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T09:03:09.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "42.207.128.0" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk","recipient":["ataylor@umbrella.bank"],"senderIP":"42.207.128.0","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=42.207.128.0 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=42.207.128.0 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk","recipient":["ataylor@umbrella.bank"],"senderIP":"42.207.128.0","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=42.207.128.0 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=umbrella.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=42.207.128.0 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk emailsendingserver: 69.72.42.1 emailsubject: Annual Leave Compliance Report for 2023 Matters Arisen filehash: <20231108090308.9DE74CBBDC71A6CE@gmx.de> filename: from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-08T09:03:09.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 42.207.128.0
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk","recipient":["ataylor@stark.bank"],"senderIP":"156.32.103.32","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=156.32.103.32 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=156.32.103.32 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk", "emailsendingserver": "69.72.42.1", "emailsubject": "Annual Leave Compliance Report for 2023 Matters Arisen", "filehash": "<20231108090308.9DE74CBBDC71A6CE@gmx.de>", "filename": "from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatTime\":\"2023-11-08T08:46:21.000Z\",\"threat\":\"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatTime\":\"2023-11-08T08:45:26.000Z\",\"threat\":\"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-08T09:03:09.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Annual Leave Compliance Report for 2023 Matters Arisen \",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4003,\"headerFrom\":\"HR Department <rolcauhengranfj@gmx.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"rolcauhengranfj@gmx.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"ataylor@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad\",\"md5\":\"daa648df8951cefe9a71b3859d4bb89c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"29341035-38f7-c690-267e-1a2d1eb65f07\",\"QID\":\"3u7w6n06hb-1\",\"GUID\":\"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy\",\"sender\":\"bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk\",\"recipient\":[\"ataylor@stark.bank\"],\"senderIP\":\"156.32.103.32\",\"messageID\":\"<20231108090308.9DE74CBBDC71A6CE@gmx.de>\"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=156.32.103.32 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=156.32.103.32 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T09:03:09.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "156.32.103.32" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk","recipient":["ataylor@stark.bank"],"senderIP":"156.32.103.32","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=156.32.103.32 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=156.32.103.32 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk","recipient":["ataylor@stark.bank"],"senderIP":"156.32.103.32","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=156.32.103.32 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=156.32.103.32 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk emailsendingserver: 69.72.42.1 emailsubject: Annual Leave Compliance Report for 2023 Matters Arisen filehash: <20231108090308.9DE74CBBDC71A6CE@gmx.de> filename: from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-08T09:03:09.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 156.32.103.32
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"235.49.73.170","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=235.49.73.170 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=235.49.73.170 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk", "emailsendingserver": "69.72.42.1", "emailsubject": "Annual Leave Compliance Report for 2023 Matters Arisen", "filehash": "<20231108090308.9DE74CBBDC71A6CE@gmx.de>", "filename": "from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatTime\":\"2023-11-08T08:46:21.000Z\",\"threat\":\"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatTime\":\"2023-11-08T08:45:26.000Z\",\"threat\":\"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-08T09:03:09.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"Annual Leave Compliance Report for 2023 Matters Arisen \",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4003,\"headerFrom\":\"HR Department <rolcauhengranfj@gmx.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"rolcauhengranfj@gmx.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"ataylor@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad\",\"md5\":\"daa648df8951cefe9a71b3859d4bb89c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"29341035-38f7-c690-267e-1a2d1eb65f07\",\"QID\":\"3u7w6n06hb-1\",\"GUID\":\"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy\",\"sender\":\"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk\",\"recipient\":[\"ataylor@wayne.bank\"],\"senderIP\":\"235.49.73.170\",\"messageID\":\"<20231108090308.9DE74CBBDC71A6CE@gmx.de>\"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=235.49.73.170 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=235.49.73.170 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T09:03:09.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "235.49.73.170" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"235.49.73.170","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=235.49.73.170 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=235.49.73.170 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"235.49.73.170","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=235.49.73.170 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=235.49.73.170 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk emailsendingserver: 69.72.42.1 emailsubject: Annual Leave Compliance Report for 2023 Matters Arisen filehash: <20231108090308.9DE74CBBDC71A6CE@gmx.de> filename: from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-08T09:03:09.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 235.49.73.170
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk","recipient":["ataylor@stark.bank"],"senderIP":"212.222.34.151","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=212.222.34.151 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=212.222.34.151 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk", "emailsendingserver": "69.72.42.1", "emailsubject": "Annual Leave Compliance Report for 2023 Matters Arisen", "filehash": "<20231108090308.9DE74CBBDC71A6CE@gmx.de>", "filename": "from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatTime\":\"2023-11-08T08:46:21.000Z\",\"threat\":\"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatTime\":\"2023-11-08T08:45:26.000Z\",\"threat\":\"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-08T09:03:09.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Annual Leave Compliance Report for 2023 Matters Arisen \",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4003,\"headerFrom\":\"HR Department <rolcauhengranfj@gmx.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"rolcauhengranfj@gmx.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"ataylor@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad\",\"md5\":\"daa648df8951cefe9a71b3859d4bb89c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"29341035-38f7-c690-267e-1a2d1eb65f07\",\"QID\":\"3u7w6n06hb-1\",\"GUID\":\"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy\",\"sender\":\"bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk\",\"recipient\":[\"ataylor@stark.bank\"],\"senderIP\":\"212.222.34.151\",\"messageID\":\"<20231108090308.9DE74CBBDC71A6CE@gmx.de>\"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=212.222.34.151 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=212.222.34.151 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T09:03:09.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "212.222.34.151" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk","recipient":["ataylor@stark.bank"],"senderIP":"212.222.34.151","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=212.222.34.151 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=212.222.34.151 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk","recipient":["ataylor@stark.bank"],"senderIP":"212.222.34.151","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=212.222.34.151 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=stark.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=212.222.34.151 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk emailsendingserver: 69.72.42.1 emailsubject: Annual Leave Compliance Report for 2023 Matters Arisen filehash: <20231108090308.9DE74CBBDC71A6CE@gmx.de> filename: from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-08T09:03:09.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 212.222.34.151
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"198.219.141.211","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=198.219.141.211 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=198.219.141.211 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk", "emailsendingserver": "69.72.42.1", "emailsubject": "Annual Leave Compliance Report for 2023 Matters Arisen", "filehash": "<20231108090308.9DE74CBBDC71A6CE@gmx.de>", "filename": "from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatTime\":\"2023-11-08T08:46:21.000Z\",\"threat\":\"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatTime\":\"2023-11-08T08:45:26.000Z\",\"threat\":\"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-08T09:03:09.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"Annual Leave Compliance Report for 2023 Matters Arisen \",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4003,\"headerFrom\":\"HR Department <rolcauhengranfj@gmx.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"rolcauhengranfj@gmx.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"ataylor@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad\",\"md5\":\"daa648df8951cefe9a71b3859d4bb89c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"29341035-38f7-c690-267e-1a2d1eb65f07\",\"QID\":\"3u7w6n06hb-1\",\"GUID\":\"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy\",\"sender\":\"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk\",\"recipient\":[\"ataylor@wayne.bank\"],\"senderIP\":\"198.219.141.211\",\"messageID\":\"<20231108090308.9DE74CBBDC71A6CE@gmx.de>\"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=198.219.141.211 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=198.219.141.211 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T09:03:09.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "198.219.141.211" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"198.219.141.211","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=198.219.141.211 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=198.219.141.211 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"198.219.141.211","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=198.219.141.211 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=198.219.141.211 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk emailsendingserver: 69.72.42.1 emailsubject: Annual Leave Compliance Report for 2023 Matters Arisen filehash: <20231108090308.9DE74CBBDC71A6CE@gmx.de> filename: from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-08T09:03:09.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 198.219.141.211
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk","recipient":["ataylor@acme.bank"],"senderIP":"208.35.84.184","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=208.35.84.184 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=208.35.84.184 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk", "emailsendingserver": "69.72.42.1", "emailsubject": "Annual Leave Compliance Report for 2023 Matters Arisen", "filehash": "<20231108090308.9DE74CBBDC71A6CE@gmx.de>", "filename": "from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatTime\":\"2023-11-08T08:46:21.000Z\",\"threat\":\"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatTime\":\"2023-11-08T08:45:26.000Z\",\"threat\":\"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-08T09:03:09.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Annual Leave Compliance Report for 2023 Matters Arisen \",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4003,\"headerFrom\":\"HR Department <rolcauhengranfj@gmx.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"rolcauhengranfj@gmx.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"ataylor@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad\",\"md5\":\"daa648df8951cefe9a71b3859d4bb89c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"29341035-38f7-c690-267e-1a2d1eb65f07\",\"QID\":\"3u7w6n06hb-1\",\"GUID\":\"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy\",\"sender\":\"bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk\",\"recipient\":[\"ataylor@acme.bank\"],\"senderIP\":\"208.35.84.184\",\"messageID\":\"<20231108090308.9DE74CBBDC71A6CE@gmx.de>\"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=208.35.84.184 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=208.35.84.184 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T09:03:09.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "208.35.84.184" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk","recipient":["ataylor@acme.bank"],"senderIP":"208.35.84.184","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=208.35.84.184 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=208.35.84.184 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk","recipient":["ataylor@acme.bank"],"senderIP":"208.35.84.184","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=208.35.84.184 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=acme.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=208.35.84.184 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk emailsendingserver: 69.72.42.1 emailsubject: Annual Leave Compliance Report for 2023 Matters Arisen filehash: <20231108090308.9DE74CBBDC71A6CE@gmx.de> filename: from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-08T09:03:09.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 208.35.84.184
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk","recipient":["ataylor@oscorp.bank"],"senderIP":"0.10.249.128","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=0.10.249.128 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=0.10.249.128 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk", "emailsendingserver": "69.72.42.1", "emailsubject": "Annual Leave Compliance Report for 2023 Matters Arisen", "filehash": "<20231108090308.9DE74CBBDC71A6CE@gmx.de>", "filename": "from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatTime\":\"2023-11-08T08:46:21.000Z\",\"threat\":\"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatTime\":\"2023-11-08T08:45:26.000Z\",\"threat\":\"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-08T09:03:09.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Annual Leave Compliance Report for 2023 Matters Arisen \",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4003,\"headerFrom\":\"HR Department <rolcauhengranfj@gmx.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"rolcauhengranfj@gmx.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"ataylor@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad\",\"md5\":\"daa648df8951cefe9a71b3859d4bb89c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"29341035-38f7-c690-267e-1a2d1eb65f07\",\"QID\":\"3u7w6n06hb-1\",\"GUID\":\"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy\",\"sender\":\"bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk\",\"recipient\":[\"ataylor@oscorp.bank\"],\"senderIP\":\"0.10.249.128\",\"messageID\":\"<20231108090308.9DE74CBBDC71A6CE@gmx.de>\"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=0.10.249.128 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=0.10.249.128 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T09:03:09.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "0.10.249.128" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk","recipient":["ataylor@oscorp.bank"],"senderIP":"0.10.249.128","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=0.10.249.128 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=0.10.249.128 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk","recipient":["ataylor@oscorp.bank"],"senderIP":"0.10.249.128","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=0.10.249.128 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=oscorp.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=0.10.249.128 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk emailsendingserver: 69.72.42.1 emailsubject: Annual Leave Compliance Report for 2023 Matters Arisen filehash: <20231108090308.9DE74CBBDC71A6CE@gmx.de> filename: from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-08T09:03:09.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 0.10.249.128
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"18.31.140.158","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=18.31.140.158 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=18.31.140.158 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk", "emailsendingserver": "69.72.42.1", "emailsubject": "Annual Leave Compliance Report for 2023 Matters Arisen", "filehash": "<20231108090308.9DE74CBBDC71A6CE@gmx.de>", "filename": "from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9\",\"threatTime\":\"2023-11-08T08:46:21.000Z\",\"threat\":\"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5\",\"threatTime\":\"2023-11-08T08:45:26.000Z\",\"threat\":\"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-08T09:03:09.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"Annual Leave Compliance Report for 2023 Matters Arisen \",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4003,\"headerFrom\":\"HR Department <rolcauhengranfj@gmx.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"rolcauhengranfj@gmx.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"ataylor@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad\",\"md5\":\"daa648df8951cefe9a71b3859d4bb89c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"29341035-38f7-c690-267e-1a2d1eb65f07\",\"QID\":\"3u7w6n06hb-1\",\"GUID\":\"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy\",\"sender\":\"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk\",\"recipient\":[\"ataylor@wayne.bank\"],\"senderIP\":\"18.31.140.158\",\"messageID\":\"<20231108090308.9DE74CBBDC71A6CE@gmx.de>\"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=18.31.140.158 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=18.31.140.158 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T09:03:09.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "18.31.140.158" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"18.31.140.158","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=18.31.140.158 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=18.31.140.158 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cb8e79b315a2927bd61a5c1e69f6f0e9f3fe60d761815458b90a096ac08ffbe9","threatTime":"2023-11-08T08:46:21.000Z","threat":"http://pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"},{"threatID":"3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/3c438d00eb7a2d0ea54bae9835f743da7e712255cb0a858f8bd8523a9fe101f5","threatTime":"2023-11-08T08:45:26.000Z","threat":"pub-14d5fc2c83c340d3bb2184a49b9d6980.r2.dev/excel.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-08T09:03:09.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Annual Leave Compliance Report for 2023 Matters Arisen ","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":4003,"headerFrom":"HR Department <rolcauhengranfj@gmx.de>","headerReplyTo":null,"fromAddress":["rolcauhengranfj@gmx.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["ataylor@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"62948065b0b6b1198ce42cadde19755a462c3c936f65f727d345b5c3f860bcad","md5":"daa648df8951cefe9a71b3859d4bb89c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"29341035-38f7-c690-267e-1a2d1eb65f07","QID":"3u7w6n06hb-1","GUID":"s9QmDPPfKttwsBAqhoSPi_UzZHxmJhQy","sender":"bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk","recipient":["ataylor@wayne.bank"],"senderIP":"18.31.140.158","messageID":"<20231108090308.9DE74CBBDC71A6CE@gmx.de>"} ::: fileHash=<20231108090308.9DE74CBBDC71A6CE@gmx.de> ::: fileName=from: bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen ::: serverIP=18.31.140.158 ::: emailFrom=bounce+0ffb49.a58fbf-ataylor=wayne.bank@kingdomarena.org.uk ::: created_at=2023-11-08T09:03:09.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Annual Leave Compliance Report for 2023 Matters Arisen ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-08T09:03:09.000Z ::: emailSendingServer=18.31.140.158 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk emailsendingserver: 69.72.42.1 emailsubject: Annual Leave Compliance Report for 2023 Matters Arisen filehash: <20231108090308.9DE74CBBDC71A6CE@gmx.de> filename: from: bounce+0ffb49.a58fbf-ataylor=calprivate.bank@kingdomarena.org.uk subj: Annual Leave Compliance Report for 2023 Matters Arisen messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-08T09:03:09.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 18.31.140.158
Explain this syslog message
<132>Dec 31 09:06:15 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704013575|access denied|247.218.140.208|https://shareholders.umbrella.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Dec 31 09:06:15", "message": "<132>Dec 31 09:06:15 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704013575|access denied|247.218.140.208|https://shareholders.umbrella.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1704013575", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "247.218.140.208" }
Create a JSON artifact from the message
<132>Dec 31 09:06:15 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704013575|access denied|247.218.140.208|https://shareholders.umbrella.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Dec 31 09:06:15 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704013575|access denied|247.218.140.208|https://shareholders.umbrella.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Dec 31 09:06:15 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1704013575 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 247.218.140.208
Explain this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"67.158.78.233","externalIp":"173.173.86.238","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=67.158.78.233 ::: serverIP=173.173.86.238 ::: userName=johndoe ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-14T19:24:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={\"originId\":410613010,\"originType\":\"AD Users\",\"internalIp\":\"67.158.78.233\",\"externalIp\":\"173.173.86.238\",\"categories\":[\"Advertisements\",\"Malware\"],\"tags\":[],\"destination\":\"omnatuor.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-14T19:24:58.000Z\"} ::: clientIP=67.158.78.233 ::: serverIP=173.173.86.238 ::: userName=johndoe ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "omnatuor.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "omnatuor.com", "vendorcode": "AdvertisementsMalware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "67.158.78.233", "serverIP": "173.173.86.238", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"67.158.78.233","externalIp":"173.173.86.238","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=67.158.78.233 ::: serverIP=173.173.86.238 ::: userName=johndoe ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"67.158.78.233","externalIp":"173.173.86.238","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=67.158.78.233 ::: serverIP=173.173.86.238 ::: userName=johndoe ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-14T19:24:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: omnatuor.com messagetype: firewall_action severitycode: 2 fqdn: omnatuor.com vendorcode: AdvertisementsMalware action: block streamName: OpenDNS Detection clientIP: 67.158.78.233 serverIP: 173.173.86.238 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"210.243.176.176","externalIp":"149.152.253.190","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=210.243.176.176 ::: serverIP=149.152.253.190 ::: userName=fish ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-14T19:24:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={\"originId\":410613010,\"originType\":\"AD Users\",\"internalIp\":\"210.243.176.176\",\"externalIp\":\"149.152.253.190\",\"categories\":[\"Advertisements\",\"Malware\"],\"tags\":[],\"destination\":\"omnatuor.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-14T19:24:58.000Z\"} ::: clientIP=210.243.176.176 ::: serverIP=149.152.253.190 ::: userName=fish ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "omnatuor.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "omnatuor.com", "vendorcode": "AdvertisementsMalware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "210.243.176.176", "serverIP": "149.152.253.190", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"210.243.176.176","externalIp":"149.152.253.190","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=210.243.176.176 ::: serverIP=149.152.253.190 ::: userName=fish ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"210.243.176.176","externalIp":"149.152.253.190","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=210.243.176.176 ::: serverIP=149.152.253.190 ::: userName=fish ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-14T19:24:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: omnatuor.com messagetype: firewall_action severitycode: 2 fqdn: omnatuor.com vendorcode: AdvertisementsMalware action: block streamName: OpenDNS Detection clientIP: 210.243.176.176 serverIP: 149.152.253.190 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"18.69.109.247","externalIp":"208.143.36.82","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-14T15:08:05.000Z"} ::: clientIP=18.69.109.247 ::: serverIP=208.143.36.82 ::: userName=bob ::: created_at=2022-12-14T15:08:05.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T15:08:05.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-14T15:08:05.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"18.69.109.247\",\"externalIp\":\"208.143.36.82\",\"categories\":[\"Advertisements\",\"Malware\"],\"tags\":[],\"destination\":\"omnatuor.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-14T15:08:05.000Z\"} ::: clientIP=18.69.109.247 ::: serverIP=208.143.36.82 ::: userName=bob ::: created_at=2022-12-14T15:08:05.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T15:08:05.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "omnatuor.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "omnatuor.com", "vendorcode": "AdvertisementsMalware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "18.69.109.247", "serverIP": "208.143.36.82", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"18.69.109.247","externalIp":"208.143.36.82","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-14T15:08:05.000Z"} ::: clientIP=18.69.109.247 ::: serverIP=208.143.36.82 ::: userName=bob ::: created_at=2022-12-14T15:08:05.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T15:08:05.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"18.69.109.247","externalIp":"208.143.36.82","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-14T15:08:05.000Z"} ::: clientIP=18.69.109.247 ::: serverIP=208.143.36.82 ::: userName=bob ::: created_at=2022-12-14T15:08:05.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T15:08:05.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-14T15:08:05.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: omnatuor.com messagetype: firewall_action severitycode: 2 fqdn: omnatuor.com vendorcode: AdvertisementsMalware action: block streamName: OpenDNS Detection clientIP: 18.69.109.247 serverIP: 208.143.36.82 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.106.213.185","externalIp":"84.110.64.80","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T15:08:05.000Z"} ::: clientIP=137.106.213.185 ::: serverIP=84.110.64.80 ::: userName=charlie ::: created_at=2022-12-14T15:08:05.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T15:08:05.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-14T15:08:05.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"137.106.213.185\",\"externalIp\":\"84.110.64.80\",\"categories\":[\"Advertisements\",\"Malware\"],\"tags\":[],\"destination\":\"omnatuor.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-14T15:08:05.000Z\"} ::: clientIP=137.106.213.185 ::: serverIP=84.110.64.80 ::: userName=charlie ::: created_at=2022-12-14T15:08:05.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T15:08:05.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "omnatuor.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "omnatuor.com", "vendorcode": "AdvertisementsMalware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "137.106.213.185", "serverIP": "84.110.64.80", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.106.213.185","externalIp":"84.110.64.80","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T15:08:05.000Z"} ::: clientIP=137.106.213.185 ::: serverIP=84.110.64.80 ::: userName=charlie ::: created_at=2022-12-14T15:08:05.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T15:08:05.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.106.213.185","externalIp":"84.110.64.80","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T15:08:05.000Z"} ::: clientIP=137.106.213.185 ::: serverIP=84.110.64.80 ::: userName=charlie ::: created_at=2022-12-14T15:08:05.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T15:08:05.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-14T15:08:05.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: omnatuor.com messagetype: firewall_action severitycode: 2 fqdn: omnatuor.com vendorcode: AdvertisementsMalware action: block streamName: OpenDNS Detection clientIP: 137.106.213.185 serverIP: 84.110.64.80 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.130.186.198","externalIp":"176.61.187.172","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-13T19:32:33.000Z"} ::: clientIP=135.130.186.198 ::: serverIP=176.61.187.172 ::: userName=fish ::: created_at=2022-12-13T19:32:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-13T19:32:33.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-13T19:32:33.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"135.130.186.198\",\"externalIp\":\"176.61.187.172\",\"categories\":[\"Advertisements\",\"Malware\"],\"tags\":[],\"destination\":\"omnatuor.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-13T19:32:33.000Z\"} ::: clientIP=135.130.186.198 ::: serverIP=176.61.187.172 ::: userName=fish ::: created_at=2022-12-13T19:32:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-13T19:32:33.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "omnatuor.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "omnatuor.com", "vendorcode": "AdvertisementsMalware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "135.130.186.198", "serverIP": "176.61.187.172", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.130.186.198","externalIp":"176.61.187.172","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-13T19:32:33.000Z"} ::: clientIP=135.130.186.198 ::: serverIP=176.61.187.172 ::: userName=fish ::: created_at=2022-12-13T19:32:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-13T19:32:33.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.130.186.198","externalIp":"176.61.187.172","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-13T19:32:33.000Z"} ::: clientIP=135.130.186.198 ::: serverIP=176.61.187.172 ::: userName=fish ::: created_at=2022-12-13T19:32:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-13T19:32:33.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-13T19:32:33.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: omnatuor.com messagetype: firewall_action severitycode: 2 fqdn: omnatuor.com vendorcode: AdvertisementsMalware action: block streamName: OpenDNS Detection clientIP: 135.130.186.198 serverIP: 176.61.187.172 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"159.252.246.255","externalIp":"55.84.86.105","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-13T19:32:33.000Z"} ::: clientIP=159.252.246.255 ::: serverIP=55.84.86.105 ::: userName=charlie ::: created_at=2022-12-13T19:32:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-13T19:32:33.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-13T19:32:33.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"159.252.246.255\",\"externalIp\":\"55.84.86.105\",\"categories\":[\"Advertisements\",\"Malware\"],\"tags\":[],\"destination\":\"omnatuor.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-13T19:32:33.000Z\"} ::: clientIP=159.252.246.255 ::: serverIP=55.84.86.105 ::: userName=charlie ::: created_at=2022-12-13T19:32:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-13T19:32:33.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "omnatuor.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "omnatuor.com", "vendorcode": "AdvertisementsMalware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "159.252.246.255", "serverIP": "55.84.86.105", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"159.252.246.255","externalIp":"55.84.86.105","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-13T19:32:33.000Z"} ::: clientIP=159.252.246.255 ::: serverIP=55.84.86.105 ::: userName=charlie ::: created_at=2022-12-13T19:32:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-13T19:32:33.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"159.252.246.255","externalIp":"55.84.86.105","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-13T19:32:33.000Z"} ::: clientIP=159.252.246.255 ::: serverIP=55.84.86.105 ::: userName=charlie ::: created_at=2022-12-13T19:32:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-13T19:32:33.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-13T19:32:33.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: omnatuor.com messagetype: firewall_action severitycode: 2 fqdn: omnatuor.com vendorcode: AdvertisementsMalware action: block streamName: OpenDNS Detection clientIP: 159.252.246.255 serverIP: 55.84.86.105 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"86.178.156.168","externalIp":"56.223.191.107","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=86.178.156.168 ::: serverIP=56.223.191.107 ::: userName=charlie ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-14T19:24:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={\"originId\":410613010,\"originType\":\"AD Users\",\"internalIp\":\"86.178.156.168\",\"externalIp\":\"56.223.191.107\",\"categories\":[\"Advertisements\",\"Malware\"],\"tags\":[],\"destination\":\"omnatuor.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-14T19:24:58.000Z\"} ::: clientIP=86.178.156.168 ::: serverIP=56.223.191.107 ::: userName=charlie ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "omnatuor.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "omnatuor.com", "vendorcode": "AdvertisementsMalware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "86.178.156.168", "serverIP": "56.223.191.107", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"86.178.156.168","externalIp":"56.223.191.107","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=86.178.156.168 ::: serverIP=56.223.191.107 ::: userName=charlie ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"86.178.156.168","externalIp":"56.223.191.107","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=86.178.156.168 ::: serverIP=56.223.191.107 ::: userName=charlie ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-14T19:24:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: omnatuor.com messagetype: firewall_action severitycode: 2 fqdn: omnatuor.com vendorcode: AdvertisementsMalware action: block streamName: OpenDNS Detection clientIP: 86.178.156.168 serverIP: 56.223.191.107 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"18.87.224.102","externalIp":"193.238.126.70","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=18.87.224.102 ::: serverIP=193.238.126.70 ::: userName=charlie ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-14T19:24:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={\"originId\":410613010,\"originType\":\"AD Users\",\"internalIp\":\"18.87.224.102\",\"externalIp\":\"193.238.126.70\",\"categories\":[\"Advertisements\",\"Malware\"],\"tags\":[],\"destination\":\"omnatuor.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-14T19:24:58.000Z\"} ::: clientIP=18.87.224.102 ::: serverIP=193.238.126.70 ::: userName=charlie ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "omnatuor.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "omnatuor.com", "vendorcode": "AdvertisementsMalware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "18.87.224.102", "serverIP": "193.238.126.70", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"18.87.224.102","externalIp":"193.238.126.70","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=18.87.224.102 ::: serverIP=193.238.126.70 ::: userName=charlie ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=omnatuor.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"18.87.224.102","externalIp":"193.238.126.70","categories":["Advertisements","Malware"],"tags":[],"destination":"omnatuor.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-14T19:24:58.000Z"} ::: clientIP=18.87.224.102 ::: serverIP=193.238.126.70 ::: userName=charlie ::: created_at=2022-12-14T19:24:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-14T19:24:58.000Z ::: serverHostname=omnatuor.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-14T19:24:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: omnatuor.com messagetype: firewall_action severitycode: 2 fqdn: omnatuor.com vendorcode: AdvertisementsMalware action: block streamName: OpenDNS Detection clientIP: 18.87.224.102 serverIP: 193.238.126.70 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.134.62.196","externalIp":"240.27.76.82","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=157.134.62.196 ::: serverIP=240.27.76.82 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-09T19:51:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"157.134.62.196\",\"externalIp\":\"240.27.76.82\",\"categories\":[\"Phishing\",\"Not Actionable\"],\"tags\":[],\"destination\":\"compete4.buzz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-09T19:51:35.000Z\"} ::: clientIP=157.134.62.196 ::: serverIP=240.27.76.82 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "compete4.buzz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "compete4.buzz", "vendorcode": "PhishingNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "157.134.62.196", "serverIP": "240.27.76.82", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.134.62.196","externalIp":"240.27.76.82","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=157.134.62.196 ::: serverIP=240.27.76.82 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.134.62.196","externalIp":"240.27.76.82","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=157.134.62.196 ::: serverIP=240.27.76.82 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-09T19:51:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: compete4.buzz messagetype: firewall_action severitycode: 2 fqdn: compete4.buzz vendorcode: PhishingNot Actionable action: block streamName: OpenDNS Detection clientIP: 157.134.62.196 serverIP: 240.27.76.82 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"102.221.122.158","externalIp":"78.111.149.83","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=102.221.122.158 ::: serverIP=78.111.149.83 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-09T19:51:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"102.221.122.158\",\"externalIp\":\"78.111.149.83\",\"categories\":[\"Phishing\",\"Not Actionable\"],\"tags\":[],\"destination\":\"compete4.buzz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-09T19:51:35.000Z\"} ::: clientIP=102.221.122.158 ::: serverIP=78.111.149.83 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "compete4.buzz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "compete4.buzz", "vendorcode": "PhishingNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "102.221.122.158", "serverIP": "78.111.149.83", "userName": "fish" }
Create a JSON artifact from the message