input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"192.223.25.162","externalIp":"162.129.60.159","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=192.223.25.162 ::: serverIP=162.129.60.159 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 192.223.25.162
serverIP: 162.129.60.159
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"73.196.211.88","externalIp":"45.158.3.76","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=73.196.211.88 ::: serverIP=45.158.3.76 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"73.196.211.88\",\"externalIp\":\"45.158.3.76\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=73.196.211.88 ::: serverIP=45.158.3.76 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "73.196.211.88",
"serverIP": "45.158.3.76",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"73.196.211.88","externalIp":"45.158.3.76","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=73.196.211.88 ::: serverIP=45.158.3.76 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"73.196.211.88","externalIp":"45.158.3.76","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=73.196.211.88 ::: serverIP=45.158.3.76 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 73.196.211.88
serverIP: 45.158.3.76
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"68.184.52.48","externalIp":"244.34.153.14","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=68.184.52.48 ::: serverIP=244.34.153.14 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"68.184.52.48\",\"externalIp\":\"244.34.153.14\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=68.184.52.48 ::: serverIP=244.34.153.14 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "68.184.52.48",
"serverIP": "244.34.153.14",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"68.184.52.48","externalIp":"244.34.153.14","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=68.184.52.48 ::: serverIP=244.34.153.14 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"68.184.52.48","externalIp":"244.34.153.14","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=68.184.52.48 ::: serverIP=244.34.153.14 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 68.184.52.48
serverIP: 244.34.153.14
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"175.27.88.69","externalIp":"159.125.53.23","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=175.27.88.69 ::: serverIP=159.125.53.23 ::: userName=janedoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"175.27.88.69\",\"externalIp\":\"159.125.53.23\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=175.27.88.69 ::: serverIP=159.125.53.23 ::: userName=janedoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "175.27.88.69",
"serverIP": "159.125.53.23",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"175.27.88.69","externalIp":"159.125.53.23","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=175.27.88.69 ::: serverIP=159.125.53.23 ::: userName=janedoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"175.27.88.69","externalIp":"159.125.53.23","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=175.27.88.69 ::: serverIP=159.125.53.23 ::: userName=janedoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 175.27.88.69
serverIP: 159.125.53.23
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"7.135.99.54","externalIp":"14.100.3.138","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=7.135.99.54 ::: serverIP=14.100.3.138 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"7.135.99.54\",\"externalIp\":\"14.100.3.138\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=7.135.99.54 ::: serverIP=14.100.3.138 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "7.135.99.54",
"serverIP": "14.100.3.138",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"7.135.99.54","externalIp":"14.100.3.138","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=7.135.99.54 ::: serverIP=14.100.3.138 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"7.135.99.54","externalIp":"14.100.3.138","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=7.135.99.54 ::: serverIP=14.100.3.138 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 7.135.99.54
serverIP: 14.100.3.138
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"242.3.29.154","externalIp":"39.74.119.208","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=242.3.29.154 ::: serverIP=39.74.119.208 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"242.3.29.154\",\"externalIp\":\"39.74.119.208\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=242.3.29.154 ::: serverIP=39.74.119.208 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "242.3.29.154",
"serverIP": "39.74.119.208",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"242.3.29.154","externalIp":"39.74.119.208","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=242.3.29.154 ::: serverIP=39.74.119.208 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"242.3.29.154","externalIp":"39.74.119.208","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=242.3.29.154 ::: serverIP=39.74.119.208 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 242.3.29.154
serverIP: 39.74.119.208
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"144.82.204.11","externalIp":"41.2.213.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=144.82.204.11 ::: serverIP=41.2.213.49 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"144.82.204.11\",\"externalIp\":\"41.2.213.49\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=144.82.204.11 ::: serverIP=41.2.213.49 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "144.82.204.11",
"serverIP": "41.2.213.49",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"144.82.204.11","externalIp":"41.2.213.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=144.82.204.11 ::: serverIP=41.2.213.49 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"144.82.204.11","externalIp":"41.2.213.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=144.82.204.11 ::: serverIP=41.2.213.49 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 144.82.204.11
serverIP: 41.2.213.49
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"117.148.159.77","externalIp":"91.107.134.58","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=117.148.159.77 ::: serverIP=91.107.134.58 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"117.148.159.77\",\"externalIp\":\"91.107.134.58\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=117.148.159.77 ::: serverIP=91.107.134.58 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "117.148.159.77",
"serverIP": "91.107.134.58",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"117.148.159.77","externalIp":"91.107.134.58","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=117.148.159.77 ::: serverIP=91.107.134.58 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"117.148.159.77","externalIp":"91.107.134.58","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=117.148.159.77 ::: serverIP=91.107.134.58 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 117.148.159.77
serverIP: 91.107.134.58
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=198.58.37.250 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T12:46:27Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\\\" \",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572\",\"sha256\":\"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99\",\"md5\":\"fbab280d0cac5e21c72f0a1a7b5b9608\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"explorer.exe\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=198.58.37.250 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T12:46:27Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "198.58.37.250",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=198.58.37.250 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=198.58.37.250 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99
filename: setup.exe
filepath: \Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T12:46:27Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 198.58.37.250
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=232.231.183.105 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T12:46:27Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\\\" \",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572\",\"sha256\":\"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99\",\"md5\":\"fbab280d0cac5e21c72f0a1a7b5b9608\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"explorer.exe\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=232.231.183.105 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T12:46:27Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "232.231.183.105",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=232.231.183.105 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=232.231.183.105 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99
filename: setup.exe
filepath: \Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T12:46:27Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 232.231.183.105
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=50.195.84.109 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=bob ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T12:46:27Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\\\" \",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572\",\"sha256\":\"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99\",\"md5\":\"fbab280d0cac5e21c72f0a1a7b5b9608\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"explorer.exe\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=50.195.84.109 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe ::: userName=bob ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T12:46:27Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "50.195.84.109",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=50.195.84.109 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=bob ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=50.195.84.109 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=bob ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99
filename: setup.exe
filepath: \Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T12:46:27Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 50.195.84.109
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-08T15:40:34Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\johndoe\\AppData\\Local\\Temp\\APD4\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD4\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17180790651","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574698685864","sha256":"1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7","md5":"bc49243557991ac42fcc01b8e3bb05d2","parent_details":{"parent_sha256":"0c74acb8b06d388c10e95c95cf0740fe3af9996693ab5ad82b48dc8cf35b9f00","parent_md5":"6036fc9ed950ed420f4d85f2c4d89136","parent_cmdline":"\"C:\\epson\\TM-H6000IV_APD_v.4.56d\\APD_456dE.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574692595317"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=51.38.13.50 ::: fileHash=1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\johndoe\AppData\Local\Temp\APD4\setup.exe ::: userName=johndoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-06-08T15:40:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-08T15:40:34Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\APD4\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-08T15:40:34Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\johndoe\\\\AppData\\\\Local\\\\Temp\\\\APD4\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD4\\\\Setup.exe\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17180790651\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1574698685864\",\"sha256\":\"1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7\",\"md5\":\"bc49243557991ac42fcc01b8e3bb05d2\",\"parent_details\":{\"parent_sha256\":\"0c74acb8b06d388c10e95c95cf0740fe3af9996693ab5ad82b48dc8cf35b9f00\",\"parent_md5\":\"6036fc9ed950ed420f4d85f2c4d89136\",\"parent_cmdline\":\"\\\"C:\\\\epson\\\\TM-H6000IV_APD_v.4.56d\\\\APD_456dE.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1574692595317\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=51.38.13.50 ::: fileHash=1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\johndoe\\AppData\\Local\\Temp\\APD4\\setup.exe ::: userName=johndoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-06-08T15:40:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-08T15:40:34Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-08T15:40:34Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "51.38.13.50",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-08T15:40:34Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\johndoe\\AppData\\Local\\Temp\\APD4\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD4\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17180790651","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574698685864","sha256":"1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7","md5":"bc49243557991ac42fcc01b8e3bb05d2","parent_details":{"parent_sha256":"0c74acb8b06d388c10e95c95cf0740fe3af9996693ab5ad82b48dc8cf35b9f00","parent_md5":"6036fc9ed950ed420f4d85f2c4d89136","parent_cmdline":"\"C:\\epson\\TM-H6000IV_APD_v.4.56d\\APD_456dE.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574692595317"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=51.38.13.50 ::: fileHash=1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\johndoe\AppData\Local\Temp\APD4\setup.exe ::: userName=johndoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-06-08T15:40:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-08T15:40:34Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-08T15:40:34Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\johndoe\\AppData\\Local\\Temp\\APD4\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD4\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17180790651","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574698685864","sha256":"1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7","md5":"bc49243557991ac42fcc01b8e3bb05d2","parent_details":{"parent_sha256":"0c74acb8b06d388c10e95c95cf0740fe3af9996693ab5ad82b48dc8cf35b9f00","parent_md5":"6036fc9ed950ed420f4d85f2c4d89136","parent_cmdline":"\"C:\\epson\\TM-H6000IV_APD_v.4.56d\\APD_456dE.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574692595317"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=51.38.13.50 ::: fileHash=1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\johndoe\AppData\Local\Temp\APD4\setup.exe ::: userName=johndoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-06-08T15:40:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-08T15:40:34Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: 1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7
filename: setup.exe
filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\APD4\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-08T15:40:34Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 51.38.13.50
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-08T15:40:34Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\APD4\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD4\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17180790651","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574698685864","sha256":"1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7","md5":"bc49243557991ac42fcc01b8e3bb05d2","parent_details":{"parent_sha256":"0c74acb8b06d388c10e95c95cf0740fe3af9996693ab5ad82b48dc8cf35b9f00","parent_md5":"6036fc9ed950ed420f4d85f2c4d89136","parent_cmdline":"\"C:\\epson\\TM-H6000IV_APD_v.4.56d\\APD_456dE.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574692595317"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=131.196.209.33 ::: fileHash=1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\APD4\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-06-08T15:40:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-08T15:40:34Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\APD4\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-08T15:40:34Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\janedoe\\\\AppData\\\\Local\\\\Temp\\\\APD4\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD4\\\\Setup.exe\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17180790651\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1574698685864\",\"sha256\":\"1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7\",\"md5\":\"bc49243557991ac42fcc01b8e3bb05d2\",\"parent_details\":{\"parent_sha256\":\"0c74acb8b06d388c10e95c95cf0740fe3af9996693ab5ad82b48dc8cf35b9f00\",\"parent_md5\":\"6036fc9ed950ed420f4d85f2c4d89136\",\"parent_cmdline\":\"\\\"C:\\\\epson\\\\TM-H6000IV_APD_v.4.56d\\\\APD_456dE.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1574692595317\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=131.196.209.33 ::: fileHash=1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\APD4\\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-06-08T15:40:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-08T15:40:34Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-08T15:40:34Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "131.196.209.33",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-08T15:40:34Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\APD4\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD4\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17180790651","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574698685864","sha256":"1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7","md5":"bc49243557991ac42fcc01b8e3bb05d2","parent_details":{"parent_sha256":"0c74acb8b06d388c10e95c95cf0740fe3af9996693ab5ad82b48dc8cf35b9f00","parent_md5":"6036fc9ed950ed420f4d85f2c4d89136","parent_cmdline":"\"C:\\epson\\TM-H6000IV_APD_v.4.56d\\APD_456dE.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574692595317"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=131.196.209.33 ::: fileHash=1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\APD4\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-06-08T15:40:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-08T15:40:34Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-08T15:40:34Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\APD4\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD4\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17180790651","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574698685864","sha256":"1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7","md5":"bc49243557991ac42fcc01b8e3bb05d2","parent_details":{"parent_sha256":"0c74acb8b06d388c10e95c95cf0740fe3af9996693ab5ad82b48dc8cf35b9f00","parent_md5":"6036fc9ed950ed420f4d85f2c4d89136","parent_cmdline":"\"C:\\epson\\TM-H6000IV_APD_v.4.56d\\APD_456dE.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1574692595317"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=131.196.209.33 ::: fileHash=1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\APD4\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-06-08T15:40:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-08T15:40:34Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: 1e3bae1ac3aebb97580a63787f321a3f4004ab072da7a3cd20eb1c4f1ccbcfa7
filename: setup.exe
filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\APD4\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-08T15:40:34Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 131.196.209.33
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"198.54.159.210","externalIp":"23.40.54.251","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=198.54.159.210 ::: serverIP=23.40.54.251 ::: userName=janedoe ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612150,\"originType\":\"AD Users\",\"internalIp\":\"198.54.159.210\",\"externalIp\":\"23.40.54.251\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-03T19:40:26.000Z\"} ::: clientIP=198.54.159.210 ::: serverIP=23.40.54.251 ::: userName=janedoe ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-03T19:40:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "198.54.159.210",
"serverIP": "23.40.54.251",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"198.54.159.210","externalIp":"23.40.54.251","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=198.54.159.210 ::: serverIP=23.40.54.251 ::: userName=janedoe ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"198.54.159.210","externalIp":"23.40.54.251","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=198.54.159.210 ::: serverIP=23.40.54.251 ::: userName=janedoe ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-03T19:40:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 198.54.159.210
serverIP: 23.40.54.251
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"78.136.71.188","externalIp":"237.89.234.104","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=78.136.71.188 ::: serverIP=237.89.234.104 ::: userName=janedoe ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612150,\"originType\":\"AD Users\",\"internalIp\":\"78.136.71.188\",\"externalIp\":\"237.89.234.104\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-03T19:40:26.000Z\"} ::: clientIP=78.136.71.188 ::: serverIP=237.89.234.104 ::: userName=janedoe ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-03T19:40:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "78.136.71.188",
"serverIP": "237.89.234.104",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"78.136.71.188","externalIp":"237.89.234.104","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=78.136.71.188 ::: serverIP=237.89.234.104 ::: userName=janedoe ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"78.136.71.188","externalIp":"237.89.234.104","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=78.136.71.188 ::: serverIP=237.89.234.104 ::: userName=janedoe ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-03T19:40:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 78.136.71.188
serverIP: 237.89.234.104
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"115.77.208.228","externalIp":"115.77.208.228","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=115.77.208.228 ::: serverIP=115.77.208.228 ::: userName=bob ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612080,\"originType\":\"AD Users\",\"internalIp\":\"115.77.208.228\",\"externalIp\":\"115.77.208.228\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-02T12:16:30.000Z\"} ::: clientIP=115.77.208.228 ::: serverIP=115.77.208.228 ::: userName=bob ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-02T12:16:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "115.77.208.228",
"serverIP": "150.162.50.119",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"115.77.208.228","externalIp":"115.77.208.228","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=115.77.208.228 ::: serverIP=115.77.208.228 ::: userName=bob ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"115.77.208.228","externalIp":"115.77.208.228","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=115.77.208.228 ::: serverIP=115.77.208.228 ::: userName=bob ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-02T12:16:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 115.77.208.228
serverIP: 150.162.50.119
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"64.23.62.14","externalIp":"64.23.62.14","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=64.23.62.14 ::: serverIP=64.23.62.14 ::: userName=nighthawk ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612080,\"originType\":\"AD Users\",\"internalIp\":\"64.23.62.14\",\"externalIp\":\"64.23.62.14\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-02T12:16:30.000Z\"} ::: clientIP=64.23.62.14 ::: serverIP=64.23.62.14 ::: userName=nighthawk ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-02T12:16:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "64.23.62.14",
"serverIP": "80.86.77.74",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"64.23.62.14","externalIp":"64.23.62.14","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=64.23.62.14 ::: serverIP=64.23.62.14 ::: userName=nighthawk ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"64.23.62.14","externalIp":"64.23.62.14","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=64.23.62.14 ::: serverIP=64.23.62.14 ::: userName=nighthawk ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-02T12:16:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 64.23.62.14
serverIP: 80.86.77.74
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"83.64.197.97","externalIp":"83.64.197.97","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=83.64.197.97 ::: serverIP=83.64.197.97 ::: userName=alice ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612080,\"originType\":\"AD Users\",\"internalIp\":\"83.64.197.97\",\"externalIp\":\"83.64.197.97\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-02T12:16:30.000Z\"} ::: clientIP=83.64.197.97 ::: serverIP=83.64.197.97 ::: userName=alice ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-02T12:16:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "83.64.197.97",
"serverIP": "112.116.87.206",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"83.64.197.97","externalIp":"83.64.197.97","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=83.64.197.97 ::: serverIP=83.64.197.97 ::: userName=alice ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"83.64.197.97","externalIp":"83.64.197.97","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=83.64.197.97 ::: serverIP=83.64.197.97 ::: userName=alice ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-02T12:16:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 83.64.197.97
serverIP: 112.116.87.206
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"172.198.40.59","externalIp":"172.198.40.59","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=172.198.40.59 ::: serverIP=172.198.40.59 ::: userName=alice ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612080,\"originType\":\"AD Users\",\"internalIp\":\"172.198.40.59\",\"externalIp\":\"172.198.40.59\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-02T12:16:30.000Z\"} ::: clientIP=172.198.40.59 ::: serverIP=172.198.40.59 ::: userName=alice ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-02T12:16:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "172.198.40.59",
"serverIP": "36.201.174.215",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"172.198.40.59","externalIp":"172.198.40.59","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=172.198.40.59 ::: serverIP=172.198.40.59 ::: userName=alice ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612080,"originType":"AD Users","internalIp":"172.198.40.59","externalIp":"172.198.40.59","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-02T12:16:30.000Z"} ::: clientIP=172.198.40.59 ::: serverIP=172.198.40.59 ::: userName=alice ::: created_at=2023-04-02T12:16:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-02T12:16:30.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-02T12:16:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 172.198.40.59
serverIP: 36.201.174.215
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"154.14.201.182","externalIp":"6.186.85.51","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=154.14.201.182 ::: serverIP=6.186.85.51 ::: userName=alice ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612150,\"originType\":\"AD Users\",\"internalIp\":\"154.14.201.182\",\"externalIp\":\"6.186.85.51\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-03T19:40:26.000Z\"} ::: clientIP=154.14.201.182 ::: serverIP=6.186.85.51 ::: userName=alice ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-03T19:40:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "154.14.201.182",
"serverIP": "6.186.85.51",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"154.14.201.182","externalIp":"6.186.85.51","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=154.14.201.182 ::: serverIP=6.186.85.51 ::: userName=alice ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"154.14.201.182","externalIp":"6.186.85.51","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=154.14.201.182 ::: serverIP=6.186.85.51 ::: userName=alice ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-03T19:40:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 154.14.201.182
serverIP: 6.186.85.51
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"93.229.146.56","externalIp":"75.199.111.151","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=93.229.146.56 ::: serverIP=75.199.111.151 ::: userName=fish ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612150,\"originType\":\"AD Users\",\"internalIp\":\"93.229.146.56\",\"externalIp\":\"75.199.111.151\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-03T19:40:26.000Z\"} ::: clientIP=93.229.146.56 ::: serverIP=75.199.111.151 ::: userName=fish ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-03T19:40:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "93.229.146.56",
"serverIP": "75.199.111.151",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"93.229.146.56","externalIp":"75.199.111.151","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=93.229.146.56 ::: serverIP=75.199.111.151 ::: userName=fish ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"93.229.146.56","externalIp":"75.199.111.151","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=93.229.146.56 ::: serverIP=75.199.111.151 ::: userName=fish ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-03T19:40:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 93.229.146.56
serverIP: 75.199.111.151
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"159.250.182.227","externalIp":"197.39.118.255","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=159.250.182.227 ::: serverIP=197.39.118.255 ::: userName=nighthawk ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612150,\"originType\":\"AD Users\",\"internalIp\":\"159.250.182.227\",\"externalIp\":\"197.39.118.255\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-03T19:40:26.000Z\"} ::: clientIP=159.250.182.227 ::: serverIP=197.39.118.255 ::: userName=nighthawk ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-03T19:40:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "159.250.182.227",
"serverIP": "197.39.118.255",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"159.250.182.227","externalIp":"197.39.118.255","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=159.250.182.227 ::: serverIP=197.39.118.255 ::: userName=nighthawk ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"159.250.182.227","externalIp":"197.39.118.255","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=159.250.182.227 ::: serverIP=197.39.118.255 ::: userName=nighthawk ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-03T19:40:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 159.250.182.227
serverIP: 197.39.118.255
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"179.46.215.180","externalIp":"95.137.161.133","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=179.46.215.180 ::: serverIP=95.137.161.133 ::: userName=bob ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "thedailyquiz.com",
"message": "WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={\"originId\":410612150,\"originType\":\"AD Users\",\"internalIp\":\"179.46.215.180\",\"externalIp\":\"95.137.161.133\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"thedailyquiz.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-03T19:40:26.000Z\"} ::: clientIP=179.46.215.180 ::: serverIP=95.137.161.133 ::: userName=bob ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "thedailyquiz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-03T19:40:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "179.46.215.180",
"serverIP": "95.137.161.133",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"179.46.215.180","externalIp":"95.137.161.133","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=179.46.215.180 ::: serverIP=95.137.161.133 ::: userName=bob ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=thedailyquiz.com ::: action=BLOCKED ::: message={"originId":410612150,"originType":"AD Users","internalIp":"179.46.215.180","externalIp":"95.137.161.133","categories":["Malware","Phishing"],"tags":[],"destination":"thedailyquiz.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-03T19:40:26.000Z"} ::: clientIP=179.46.215.180 ::: serverIP=95.137.161.133 ::: userName=bob ::: created_at=2023-04-03T19:40:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-03T19:40:26.000Z ::: serverHostname=thedailyquiz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: thedailyquiz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: thedailyquiz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-03T19:40:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 179.46.215.180
serverIP: 95.137.161.133
userName: bob | Explain this syslog message |
<172>Apr 11 2023 14:42:49 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:75.194.48.188/59937 dst outside:16.145.187.122/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 11 2023 14:42:49 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:75.194.48.188/59937 dst outside:16.145.187.122/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 59937,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "75.194.48.188",
"serverIP": "16.145.187.122"
} | Create a JSON artifact from the message |
<172>Apr 11 2023 14:42:49 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:75.194.48.188/59937 dst outside:16.145.187.122/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 11 2023 14:42:49 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:75.194.48.188/59937 dst outside:16.145.187.122/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 59937
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 75.194.48.188
serverIP: 16.145.187.122 | Explain this syslog message |
<172>Apr 11 2023 14:42:49 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:218.50.106.183/59937 dst outside:13.251.24.228/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 11 2023 14:42:49 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:218.50.106.183/59937 dst outside:13.251.24.228/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 59937,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "218.50.106.183",
"serverIP": "13.251.24.228"
} | Create a JSON artifact from the message |
<172>Apr 11 2023 14:42:49 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:218.50.106.183/59937 dst outside:13.251.24.228/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 11 2023 14:42:49 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:218.50.106.183/59937 dst outside:13.251.24.228/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 59937
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 218.50.106.183
serverIP: 13.251.24.228 | Explain this syslog message |
<172>Feb 03 2023 19:29:40 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:4.128.35.117/56919 dst outside:83.197.204.28/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 03 2023 19:29:40 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:4.128.35.117/56919 dst outside:83.197.204.28/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56919,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "4.128.35.117",
"serverIP": "83.197.204.28"
} | Create a JSON artifact from the message |
<172>Feb 03 2023 19:29:40 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:4.128.35.117/56919 dst outside:83.197.204.28/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 03 2023 19:29:40 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:4.128.35.117/56919 dst outside:83.197.204.28/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56919
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 4.128.35.117
serverIP: 83.197.204.28 | Explain this syslog message |
<172>Feb 03 2023 19:29:40 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:43.106.236.209/56919 dst outside:134.15.21.98/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 03 2023 19:29:40 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:43.106.236.209/56919 dst outside:134.15.21.98/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56919,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "43.106.236.209",
"serverIP": "134.15.21.98"
} | Create a JSON artifact from the message |
<172>Feb 03 2023 19:29:40 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:43.106.236.209/56919 dst outside:134.15.21.98/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 03 2023 19:29:40 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:43.106.236.209/56919 dst outside:134.15.21.98/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56919
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 43.106.236.209
serverIP: 134.15.21.98 | Explain this syslog message |
<172>Feb 03 2023 19:29:41 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:198.115.64.192/50137 dst outside:52.103.33.67/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 03 2023 19:29:41 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:198.115.64.192/50137 dst outside:52.103.33.67/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 50137,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "198.115.64.192",
"serverIP": "52.103.33.67"
} | Create a JSON artifact from the message |
<172>Feb 03 2023 19:29:41 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:198.115.64.192/50137 dst outside:52.103.33.67/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 03 2023 19:29:41 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:198.115.64.192/50137 dst outside:52.103.33.67/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 50137
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 198.115.64.192
serverIP: 52.103.33.67 | Explain this syslog message |
<172>Feb 03 2023 19:29:41 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:64.201.231.59/50137 dst outside:178.37.157.194/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 03 2023 19:29:41 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:64.201.231.59/50137 dst outside:178.37.157.194/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 50137,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "64.201.231.59",
"serverIP": "178.37.157.194"
} | Create a JSON artifact from the message |
<172>Feb 03 2023 19:29:41 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:64.201.231.59/50137 dst outside:178.37.157.194/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 03 2023 19:29:41 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:64.201.231.59/50137 dst outside:178.37.157.194/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 50137
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 64.201.231.59
serverIP: 178.37.157.194 | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=157.208.173.213 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=johndoe ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SPSTEWART-LT.undefined",
"clientmac": "0433c270dd11",
"filehash": "543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe",
"filename": "Setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"1dc4f51a6af846cebd666fa21c07e02f\",\"timestamp\":\"2023-10-24T17:29:57Z\",\"behavior_id\":\"458\",\"filename\":\"Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\Temp\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\Setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\WINDOWS\\\\TEMP\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\Setup.exe /s /z\\\"[-rpC:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\RHDSetup.log] -forcedowngrade -dorebootfromparent\\\" -no_selfdeleter -IS_temp -media_path:\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\\\\" -tempdisk1folder:\\\"C:\\\\WINDOWS\\\\TEMP\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\\\\" -IS_OriginalLauncher:\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\Setup.exe\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-18\",\"control_graph_id\":\"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372\",\"triggering_process_graph_id\":\"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187\",\"sha256\":\"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe\",\"md5\":\"322d8152dbffc0baab8b0cd0f963945e\",\"parent_details\":{\"parent_sha256\":\"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe\",\"parent_md5\":\"322d8152dbffc0baab8b0cd0f963945e\",\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\Setup.exe\\\" /s /z\\\"[-rpC:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\RHDSetup.log] -forcedowngrade -dorebootfromparent\\\"\",\"parent_process_graph_id\":\"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=157.208.173.213 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe ::: userName=johndoe ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-24T17:29:57Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "157.208.173.213",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=157.208.173.213 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=johndoe ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=157.208.173.213 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=johndoe ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SPSTEWART-LT.undefined
clientmac: 0433c270dd11
filehash: 543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe
filename: Setup.exe
filepath: \Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-24T17:29:57Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 157.208.173.213
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.221.61.45 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=charlie ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SPSTEWART-LT.undefined",
"clientmac": "0433c270dd11",
"filehash": "543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe",
"filename": "Setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"1dc4f51a6af846cebd666fa21c07e02f\",\"timestamp\":\"2023-10-24T17:29:57Z\",\"behavior_id\":\"458\",\"filename\":\"Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\Temp\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\Setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\WINDOWS\\\\TEMP\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\Setup.exe /s /z\\\"[-rpC:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\RHDSetup.log] -forcedowngrade -dorebootfromparent\\\" -no_selfdeleter -IS_temp -media_path:\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\\\\" -tempdisk1folder:\\\"C:\\\\WINDOWS\\\\TEMP\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\\\\" -IS_OriginalLauncher:\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\Setup.exe\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-18\",\"control_graph_id\":\"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372\",\"triggering_process_graph_id\":\"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187\",\"sha256\":\"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe\",\"md5\":\"322d8152dbffc0baab8b0cd0f963945e\",\"parent_details\":{\"parent_sha256\":\"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe\",\"parent_md5\":\"322d8152dbffc0baab8b0cd0f963945e\",\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\Setup.exe\\\" /s /z\\\"[-rpC:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\RHDSetup.log] -forcedowngrade -dorebootfromparent\\\"\",\"parent_process_graph_id\":\"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=193.221.61.45 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe ::: userName=charlie ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-24T17:29:57Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "193.221.61.45",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.221.61.45 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=charlie ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.221.61.45 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=charlie ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SPSTEWART-LT.undefined
clientmac: 0433c270dd11
filehash: 543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe
filename: Setup.exe
filepath: \Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-24T17:29:57Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 193.221.61.45
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=157.28.51.184 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=alice ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SPSTEWART-LT.undefined",
"clientmac": "0433c270dd11",
"filehash": "543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe",
"filename": "Setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"1dc4f51a6af846cebd666fa21c07e02f\",\"timestamp\":\"2023-10-24T17:29:57Z\",\"behavior_id\":\"458\",\"filename\":\"Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\Temp\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\Setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\WINDOWS\\\\TEMP\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\Setup.exe /s /z\\\"[-rpC:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\RHDSetup.log] -forcedowngrade -dorebootfromparent\\\" -no_selfdeleter -IS_temp -media_path:\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\\\\" -tempdisk1folder:\\\"C:\\\\WINDOWS\\\\TEMP\\\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\\\\\" -IS_OriginalLauncher:\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\Setup.exe\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-18\",\"control_graph_id\":\"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372\",\"triggering_process_graph_id\":\"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187\",\"sha256\":\"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe\",\"md5\":\"322d8152dbffc0baab8b0cd0f963945e\",\"parent_details\":{\"parent_sha256\":\"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe\",\"parent_md5\":\"322d8152dbffc0baab8b0cd0f963945e\",\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\17763\\\\Drivers\\\\Setup.exe\\\" /s /z\\\"[-rpC:\\\\ProgramData\\\\Dell\\\\drivers\\\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\\\RHDSetup.log] -forcedowngrade -dorebootfromparent\\\"\",\"parent_process_graph_id\":\"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=157.28.51.184 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe ::: userName=alice ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-24T17:29:57Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "157.28.51.184",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=157.28.51.184 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=alice ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"1dc4f51a6af846cebd666fa21c07e02f","timestamp":"2023-10-24T17:29:57Z","behavior_id":"458","filename":"Setup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\Temp\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe","alleged_filetype":"exe","cmdline":"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\Setup.exe /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\" -no_selfdeleter -IS_temp -media_path:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\\" -tempdisk1folder:\"C:\\WINDOWS\\TEMP\\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\\\" -IS_OriginalLauncher:\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-18","control_graph_id":"ctg:1dc4f51a6af846cebd666fa21c07e02f:193275567372","triggering_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475146958187","sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","md5":"322d8152dbffc0baab8b0cd0f963945e","parent_details":{"parent_sha256":"543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe","parent_md5":"322d8152dbffc0baab8b0cd0f963945e","parent_cmdline":"\"C:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\17763\\Drivers\\Setup.exe\" /s /z\"[-rpC:\\ProgramData\\Dell\\drivers\\b0ea8e0d-6f2f-4380-9714-52e9786cf297\\RHDSetup.log] -forcedowngrade -dorebootfromparent\"","parent_process_graph_id":"pid:1dc4f51a6af846cebd666fa21c07e02f:2475145841107"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=157.28.51.184 ::: fileHash=543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe ::: fileName=Setup.exe ::: filePath=\Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe ::: userName=alice ::: clientMAC=0433c270dd11 ::: created_at=2023-10-24T17:29:57Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-24T17:29:57Z ::: clientHostname=SPSTEWART-LT.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SPSTEWART-LT.undefined
clientmac: 0433c270dd11
filehash: 543c4257c475c2c20be7d76bc0d63b24d788206f578e67cdc5f2e96d53e03bbe
filename: Setup.exe
filepath: \Device\HarddiskVolume3\Windows\Temp\{3F1BB9E4-11E0-42D8-9773-A849405A242F}\Setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-24T17:29:57Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 157.28.51.184
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.251.150.152 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=fish ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "KDHAMI-LT2.undefined",
"clientmac": "00ff0d992884",
"filehash": "d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d",
"filename": "lpksetup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3dd8398c7bda470895e756116d398bf5\",\"timestamp\":\"2023-11-08T03:51:04Z\",\"behavior_id\":\"458\",\"filename\":\"lpksetup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\lpksetup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\lpksetup.exe\\\" -Embedding\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-18\",\"control_graph_id\":\"ctg:3dd8398c7bda470895e756116d398bf5:12885618049\",\"triggering_process_graph_id\":\"pid:3dd8398c7bda470895e756116d398bf5:14819663752\",\"sha256\":\"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d\",\"md5\":\"4470c7350bb7f2d945cc405ec81985d2\",\"parent_details\":{\"parent_sha256\":\"\",\"parent_md5\":\"\",\"parent_cmdline\":\"\",\"parent_process_graph_id\":\"\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=191.251.150.152 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe ::: userName=fish ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-08T03:51:04Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "191.251.150.152",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.251.150.152 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=fish ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.251.150.152 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=fish ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: KDHAMI-LT2.undefined
clientmac: 00ff0d992884
filehash: d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d
filename: lpksetup.exe
filepath: \Device\HarddiskVolume3\Windows\System32\lpksetup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-11-08T03:51:04Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 191.251.150.152
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=160.25.45.124 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=fish ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "KDHAMI-LT2.undefined",
"clientmac": "00ff0d992884",
"filehash": "d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d",
"filename": "lpksetup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3dd8398c7bda470895e756116d398bf5\",\"timestamp\":\"2023-11-08T03:51:04Z\",\"behavior_id\":\"458\",\"filename\":\"lpksetup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\lpksetup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\lpksetup.exe\\\" -Embedding\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-18\",\"control_graph_id\":\"ctg:3dd8398c7bda470895e756116d398bf5:12885618049\",\"triggering_process_graph_id\":\"pid:3dd8398c7bda470895e756116d398bf5:14819663752\",\"sha256\":\"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d\",\"md5\":\"4470c7350bb7f2d945cc405ec81985d2\",\"parent_details\":{\"parent_sha256\":\"\",\"parent_md5\":\"\",\"parent_cmdline\":\"\",\"parent_process_graph_id\":\"\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=160.25.45.124 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe ::: userName=fish ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-08T03:51:04Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "160.25.45.124",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=160.25.45.124 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=fish ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=160.25.45.124 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=fish ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: KDHAMI-LT2.undefined
clientmac: 00ff0d992884
filehash: d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d
filename: lpksetup.exe
filepath: \Device\HarddiskVolume3\Windows\System32\lpksetup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-11-08T03:51:04Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 160.25.45.124
userName: fish | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.