input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=77.239.113.242 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=johndoe ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "KDHAMI-LT2.undefined", "clientmac": "00ff0d992884", "filehash": "d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d", "filename": "lpksetup.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3dd8398c7bda470895e756116d398bf5\",\"timestamp\":\"2023-11-08T03:51:04Z\",\"behavior_id\":\"458\",\"filename\":\"lpksetup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\lpksetup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\lpksetup.exe\\\" -Embedding\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-18\",\"control_graph_id\":\"ctg:3dd8398c7bda470895e756116d398bf5:12885618049\",\"triggering_process_graph_id\":\"pid:3dd8398c7bda470895e756116d398bf5:14819663752\",\"sha256\":\"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d\",\"md5\":\"4470c7350bb7f2d945cc405ec81985d2\",\"parent_details\":{\"parent_sha256\":\"\",\"parent_md5\":\"\",\"parent_cmdline\":\"\",\"parent_process_graph_id\":\"\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=77.239.113.242 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe ::: userName=johndoe ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-11-08T03:51:04Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "77.239.113.242", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=77.239.113.242 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=johndoe ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=77.239.113.242 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=johndoe ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: KDHAMI-LT2.undefined clientmac: 00ff0d992884 filehash: d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d filename: lpksetup.exe filepath: \Device\HarddiskVolume3\Windows\System32\lpksetup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-11-08T03:51:04Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 77.239.113.242 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=169.78.104.50 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00ffc8e92fdb", "filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=169.78.104.50 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-17T20:24:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "169.78.104.50", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=169.78.104.50 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=169.78.104.50 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00ffc8e92fdb filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 filename: setup.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-17T20:24:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 169.78.104.50 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=182.180.19.64 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00ffc8e92fdb", "filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=182.180.19.64 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-17T20:24:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "182.180.19.64", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=182.180.19.64 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=182.180.19.64 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00ffc8e92fdb filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 filename: setup.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-17T20:24:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 182.180.19.64 userName: fish
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.98.146.151 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00ffc8e92fdb", "filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=13.98.146.151 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-17T20:24:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "13.98.146.151", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.98.146.151 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.98.146.151 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00ffc8e92fdb filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 filename: setup.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-17T20:24:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 13.98.146.151 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"98.62.163.160","externalIp":"76.88.60.186","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=98.62.163.160 ::: serverIP=76.88.60.186 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-31T15:53:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"98.62.163.160\",\"externalIp\":\"76.88.60.186\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T15:53:42.000Z\"} ::: clientIP=98.62.163.160 ::: serverIP=76.88.60.186 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "98.62.163.160", "serverIP": "76.88.60.186", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"98.62.163.160","externalIp":"76.88.60.186","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=98.62.163.160 ::: serverIP=76.88.60.186 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"98.62.163.160","externalIp":"76.88.60.186","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=98.62.163.160 ::: serverIP=76.88.60.186 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-31T15:53:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 98.62.163.160 serverIP: 76.88.60.186 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.75.63.192","externalIp":"238.1.165.58","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=198.75.63.192 ::: serverIP=238.1.165.58 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-31T15:53:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"198.75.63.192\",\"externalIp\":\"238.1.165.58\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T15:53:42.000Z\"} ::: clientIP=198.75.63.192 ::: serverIP=238.1.165.58 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "198.75.63.192", "serverIP": "238.1.165.58", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.75.63.192","externalIp":"238.1.165.58","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=198.75.63.192 ::: serverIP=238.1.165.58 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.75.63.192","externalIp":"238.1.165.58","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=198.75.63.192 ::: serverIP=238.1.165.58 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-31T15:53:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 198.75.63.192 serverIP: 238.1.165.58 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"40.212.47.232","externalIp":"22.44.62.59","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=40.212.47.232 ::: serverIP=22.44.62.59 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T13:28:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410612144,\"originType\":\"AD Users\",\"internalIp\":\"40.212.47.232\",\"externalIp\":\"22.44.62.59\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:28:01.000Z\"} ::: clientIP=40.212.47.232 ::: serverIP=22.44.62.59 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "40.212.47.232", "serverIP": "22.44.62.59", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"40.212.47.232","externalIp":"22.44.62.59","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=40.212.47.232 ::: serverIP=22.44.62.59 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"40.212.47.232","externalIp":"22.44.62.59","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=40.212.47.232 ::: serverIP=22.44.62.59 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T13:28:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 40.212.47.232 serverIP: 22.44.62.59 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"233.157.102.32","externalIp":"120.218.41.50","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=233.157.102.32 ::: serverIP=120.218.41.50 ::: userName=fish ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T13:28:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410612144,\"originType\":\"AD Users\",\"internalIp\":\"233.157.102.32\",\"externalIp\":\"120.218.41.50\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:28:01.000Z\"} ::: clientIP=233.157.102.32 ::: serverIP=120.218.41.50 ::: userName=fish ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "233.157.102.32", "serverIP": "120.218.41.50", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"233.157.102.32","externalIp":"120.218.41.50","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=233.157.102.32 ::: serverIP=120.218.41.50 ::: userName=fish ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"233.157.102.32","externalIp":"120.218.41.50","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=233.157.102.32 ::: serverIP=120.218.41.50 ::: userName=fish ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T13:28:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 233.157.102.32 serverIP: 120.218.41.50 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"53.169.48.55","externalIp":"237.190.179.186","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=53.169.48.55 ::: serverIP=237.190.179.186 ::: userName=fish ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T13:16:00.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"53.169.48.55\",\"externalIp\":\"237.190.179.186\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:16:00.000Z\"} ::: clientIP=53.169.48.55 ::: serverIP=237.190.179.186 ::: userName=fish ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "53.169.48.55", "serverIP": "237.190.179.186", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"53.169.48.55","externalIp":"237.190.179.186","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=53.169.48.55 ::: serverIP=237.190.179.186 ::: userName=fish ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"53.169.48.55","externalIp":"237.190.179.186","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=53.169.48.55 ::: serverIP=237.190.179.186 ::: userName=fish ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T13:16:00.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 53.169.48.55 serverIP: 237.190.179.186 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.197.106.145","externalIp":"79.255.246.192","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=149.197.106.145 ::: serverIP=79.255.246.192 ::: userName=charlie ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T13:16:00.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"149.197.106.145\",\"externalIp\":\"79.255.246.192\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:16:00.000Z\"} ::: clientIP=149.197.106.145 ::: serverIP=79.255.246.192 ::: userName=charlie ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "149.197.106.145", "serverIP": "79.255.246.192", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.197.106.145","externalIp":"79.255.246.192","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=149.197.106.145 ::: serverIP=79.255.246.192 ::: userName=charlie ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.197.106.145","externalIp":"79.255.246.192","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=149.197.106.145 ::: serverIP=79.255.246.192 ::: userName=charlie ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T13:16:00.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 149.197.106.145 serverIP: 79.255.246.192 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"46.113.189.161","externalIp":"157.218.114.131","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=46.113.189.161 ::: serverIP=157.218.114.131 ::: userName=bob ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T12:02:04.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"46.113.189.161\",\"externalIp\":\"157.218.114.131\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T12:02:04.000Z\"} ::: clientIP=46.113.189.161 ::: serverIP=157.218.114.131 ::: userName=bob ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "46.113.189.161", "serverIP": "157.218.114.131", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"46.113.189.161","externalIp":"157.218.114.131","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=46.113.189.161 ::: serverIP=157.218.114.131 ::: userName=bob ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"46.113.189.161","externalIp":"157.218.114.131","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=46.113.189.161 ::: serverIP=157.218.114.131 ::: userName=bob ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T12:02:04.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 46.113.189.161 serverIP: 157.218.114.131 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.44.55.182","externalIp":"130.7.118.102","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=169.44.55.182 ::: serverIP=130.7.118.102 ::: userName=charlie ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T12:02:04.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"169.44.55.182\",\"externalIp\":\"130.7.118.102\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T12:02:04.000Z\"} ::: clientIP=169.44.55.182 ::: serverIP=130.7.118.102 ::: userName=charlie ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "169.44.55.182", "serverIP": "130.7.118.102", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.44.55.182","externalIp":"130.7.118.102","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=169.44.55.182 ::: serverIP=130.7.118.102 ::: userName=charlie ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.44.55.182","externalIp":"130.7.118.102","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=169.44.55.182 ::: serverIP=130.7.118.102 ::: userName=charlie ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T12:02:04.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 169.44.55.182 serverIP: 130.7.118.102 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"144.165.225.245","externalIp":"251.163.254.162","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=144.165.225.245 ::: serverIP=251.163.254.162 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T11:39:04.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"144.165.225.245\",\"externalIp\":\"251.163.254.162\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T11:39:04.000Z\"} ::: clientIP=144.165.225.245 ::: serverIP=251.163.254.162 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "144.165.225.245", "serverIP": "251.163.254.162", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"144.165.225.245","externalIp":"251.163.254.162","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=144.165.225.245 ::: serverIP=251.163.254.162 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"144.165.225.245","externalIp":"251.163.254.162","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=144.165.225.245 ::: serverIP=251.163.254.162 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T11:39:04.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 144.165.225.245 serverIP: 251.163.254.162 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.128.255.175","externalIp":"224.86.151.181","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=71.128.255.175 ::: serverIP=224.86.151.181 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T11:39:04.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"71.128.255.175\",\"externalIp\":\"224.86.151.181\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T11:39:04.000Z\"} ::: clientIP=71.128.255.175 ::: serverIP=224.86.151.181 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "71.128.255.175", "serverIP": "224.86.151.181", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.128.255.175","externalIp":"224.86.151.181","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=71.128.255.175 ::: serverIP=224.86.151.181 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.128.255.175","externalIp":"224.86.151.181","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=71.128.255.175 ::: serverIP=224.86.151.181 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T11:39:04.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 71.128.255.175 serverIP: 224.86.151.181 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"151.114.142.156","externalIp":"254.117.174.32","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=151.114.142.156 ::: serverIP=254.117.174.32 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T13:28:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410612144,\"originType\":\"AD Users\",\"internalIp\":\"151.114.142.156\",\"externalIp\":\"254.117.174.32\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:28:01.000Z\"} ::: clientIP=151.114.142.156 ::: serverIP=254.117.174.32 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "151.114.142.156", "serverIP": "254.117.174.32", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"151.114.142.156","externalIp":"254.117.174.32","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=151.114.142.156 ::: serverIP=254.117.174.32 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"151.114.142.156","externalIp":"254.117.174.32","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=151.114.142.156 ::: serverIP=254.117.174.32 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T13:28:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 151.114.142.156 serverIP: 254.117.174.32 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"112.15.79.15","externalIp":"13.116.214.124","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=112.15.79.15 ::: serverIP=13.116.214.124 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-24T13:28:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410612144,\"originType\":\"AD Users\",\"internalIp\":\"112.15.79.15\",\"externalIp\":\"13.116.214.124\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:28:01.000Z\"} ::: clientIP=112.15.79.15 ::: serverIP=13.116.214.124 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.bookdepository.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.bookdepository.com", "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "112.15.79.15", "serverIP": "13.116.214.124", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"112.15.79.15","externalIp":"13.116.214.124","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=112.15.79.15 ::: serverIP=13.116.214.124 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"112.15.79.15","externalIp":"13.116.214.124","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=112.15.79.15 ::: serverIP=13.116.214.124 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-24T13:28:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.bookdepository.com messagetype: firewall_action severitycode: 2 fqdn: www.bookdepository.com vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping action: block streamName: OpenDNS Detection clientIP: 112.15.79.15 serverIP: 13.116.214.124 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"62.138.89.45","externalIp":"62.138.89.45","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=62.138.89.45 ::: serverIP=62.138.89.45 ::: userName=johndoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"62.138.89.45\",\"externalIp\":\"62.138.89.45\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=62.138.89.45 ::: serverIP=62.138.89.45 ::: userName=johndoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-02-06T03:54:46.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "62.138.89.45", "serverIP": "248.109.16.120", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"62.138.89.45","externalIp":"62.138.89.45","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=62.138.89.45 ::: serverIP=62.138.89.45 ::: userName=johndoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"62.138.89.45","externalIp":"62.138.89.45","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=62.138.89.45 ::: serverIP=62.138.89.45 ::: userName=johndoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-02-06T03:54:46.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 62.138.89.45 serverIP: 248.109.16.120 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"10.172.128.96","externalIp":"10.172.128.96","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=10.172.128.96 ::: serverIP=10.172.128.96 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"10.172.128.96\",\"externalIp\":\"10.172.128.96\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=10.172.128.96 ::: serverIP=10.172.128.96 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-02-06T03:54:46.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "10.172.128.96", "serverIP": "165.208.251.179", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"10.172.128.96","externalIp":"10.172.128.96","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=10.172.128.96 ::: serverIP=10.172.128.96 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"10.172.128.96","externalIp":"10.172.128.96","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=10.172.128.96 ::: serverIP=10.172.128.96 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-02-06T03:54:46.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 10.172.128.96 serverIP: 165.208.251.179 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"8.157.0.203","externalIp":"8.157.0.203","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=8.157.0.203 ::: serverIP=8.157.0.203 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"8.157.0.203\",\"externalIp\":\"8.157.0.203\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=8.157.0.203 ::: serverIP=8.157.0.203 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-02-06T03:54:46.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "8.157.0.203", "serverIP": "180.46.20.131", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"8.157.0.203","externalIp":"8.157.0.203","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=8.157.0.203 ::: serverIP=8.157.0.203 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"8.157.0.203","externalIp":"8.157.0.203","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=8.157.0.203 ::: serverIP=8.157.0.203 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-02-06T03:54:46.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 8.157.0.203 serverIP: 180.46.20.131 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"138.46.11.106","externalIp":"138.46.11.106","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=138.46.11.106 ::: serverIP=138.46.11.106 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"138.46.11.106\",\"externalIp\":\"138.46.11.106\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=138.46.11.106 ::: serverIP=138.46.11.106 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-02-06T03:54:46.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "138.46.11.106", "serverIP": "213.51.44.74", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"138.46.11.106","externalIp":"138.46.11.106","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=138.46.11.106 ::: serverIP=138.46.11.106 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"138.46.11.106","externalIp":"138.46.11.106","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=138.46.11.106 ::: serverIP=138.46.11.106 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-02-06T03:54:46.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 138.46.11.106 serverIP: 213.51.44.74 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.55.119.212","externalIp":"155.55.119.212","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=155.55.119.212 ::: serverIP=155.55.119.212 ::: userName=fish ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"155.55.119.212\",\"externalIp\":\"155.55.119.212\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=155.55.119.212 ::: serverIP=155.55.119.212 ::: userName=fish ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "155.55.119.212", "serverIP": "80.120.130.150", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.55.119.212","externalIp":"155.55.119.212","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=155.55.119.212 ::: serverIP=155.55.119.212 ::: userName=fish ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.55.119.212","externalIp":"155.55.119.212","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=155.55.119.212 ::: serverIP=155.55.119.212 ::: userName=fish ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 155.55.119.212 serverIP: 80.120.130.150 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"134.213.132.202","externalIp":"134.213.132.202","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=134.213.132.202 ::: serverIP=134.213.132.202 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"134.213.132.202\",\"externalIp\":\"134.213.132.202\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=134.213.132.202 ::: serverIP=134.213.132.202 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "134.213.132.202", "serverIP": "210.111.110.221", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"134.213.132.202","externalIp":"134.213.132.202","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=134.213.132.202 ::: serverIP=134.213.132.202 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"134.213.132.202","externalIp":"134.213.132.202","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=134.213.132.202 ::: serverIP=134.213.132.202 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 134.213.132.202 serverIP: 210.111.110.221 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.6.76.151","externalIp":"255.6.76.151","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=255.6.76.151 ::: serverIP=255.6.76.151 ::: userName=johndoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"255.6.76.151\",\"externalIp\":\"255.6.76.151\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=255.6.76.151 ::: serverIP=255.6.76.151 ::: userName=johndoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "255.6.76.151", "serverIP": "48.90.70.250", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.6.76.151","externalIp":"255.6.76.151","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=255.6.76.151 ::: serverIP=255.6.76.151 ::: userName=johndoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.6.76.151","externalIp":"255.6.76.151","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=255.6.76.151 ::: serverIP=255.6.76.151 ::: userName=johndoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 255.6.76.151 serverIP: 48.90.70.250 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"85.10.226.15","externalIp":"85.10.226.15","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=85.10.226.15 ::: serverIP=85.10.226.15 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"85.10.226.15\",\"externalIp\":\"85.10.226.15\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=85.10.226.15 ::: serverIP=85.10.226.15 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "85.10.226.15", "serverIP": "216.226.244.190", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"85.10.226.15","externalIp":"85.10.226.15","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=85.10.226.15 ::: serverIP=85.10.226.15 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"85.10.226.15","externalIp":"85.10.226.15","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=85.10.226.15 ::: serverIP=85.10.226.15 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 85.10.226.15 serverIP: 216.226.244.190 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"1.93.55.61","externalIp":"1.93.55.61","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=1.93.55.61 ::: serverIP=1.93.55.61 ::: userName=nighthawk ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"1.93.55.61\",\"externalIp\":\"1.93.55.61\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=1.93.55.61 ::: serverIP=1.93.55.61 ::: userName=nighthawk ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-02-06T03:54:46.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "1.93.55.61", "serverIP": "155.198.205.25", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"1.93.55.61","externalIp":"1.93.55.61","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=1.93.55.61 ::: serverIP=1.93.55.61 ::: userName=nighthawk ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"1.93.55.61","externalIp":"1.93.55.61","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=1.93.55.61 ::: serverIP=1.93.55.61 ::: userName=nighthawk ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-02-06T03:54:46.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 1.93.55.61 serverIP: 155.198.205.25 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"198.73.30.65","externalIp":"198.73.30.65","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=198.73.30.65 ::: serverIP=198.73.30.65 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"198.73.30.65\",\"externalIp\":\"198.73.30.65\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=198.73.30.65 ::: serverIP=198.73.30.65 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-02-06T03:54:46.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "198.73.30.65", "serverIP": "83.37.84.194", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"198.73.30.65","externalIp":"198.73.30.65","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=198.73.30.65 ::: serverIP=198.73.30.65 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"198.73.30.65","externalIp":"198.73.30.65","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=198.73.30.65 ::: serverIP=198.73.30.65 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-02-06T03:54:46.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 198.73.30.65 serverIP: 83.37.84.194 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"183.151.44.35","externalIp":"183.151.44.35","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=183.151.44.35 ::: serverIP=183.151.44.35 ::: userName=janedoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"183.151.44.35\",\"externalIp\":\"183.151.44.35\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=183.151.44.35 ::: serverIP=183.151.44.35 ::: userName=janedoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "183.151.44.35", "serverIP": "241.111.50.244", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"183.151.44.35","externalIp":"183.151.44.35","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=183.151.44.35 ::: serverIP=183.151.44.35 ::: userName=janedoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"183.151.44.35","externalIp":"183.151.44.35","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=183.151.44.35 ::: serverIP=183.151.44.35 ::: userName=janedoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 183.151.44.35 serverIP: 241.111.50.244 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"66.150.151.180","externalIp":"66.150.151.180","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=66.150.151.180 ::: serverIP=66.150.151.180 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"66.150.151.180\",\"externalIp\":\"66.150.151.180\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=66.150.151.180 ::: serverIP=66.150.151.180 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "66.150.151.180", "serverIP": "65.152.153.222", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"66.150.151.180","externalIp":"66.150.151.180","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=66.150.151.180 ::: serverIP=66.150.151.180 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"66.150.151.180","externalIp":"66.150.151.180","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=66.150.151.180 ::: serverIP=66.150.151.180 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 66.150.151.180 serverIP: 65.152.153.222 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"215.212.12.117","externalIp":"86.0.240.175","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=215.212.12.117 ::: serverIP=86.0.240.175 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"215.212.12.117\",\"externalIp\":\"86.0.240.175\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=215.212.12.117 ::: serverIP=86.0.240.175 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "215.212.12.117", "serverIP": "86.0.240.175", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"215.212.12.117","externalIp":"86.0.240.175","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=215.212.12.117 ::: serverIP=86.0.240.175 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"215.212.12.117","externalIp":"86.0.240.175","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=215.212.12.117 ::: serverIP=86.0.240.175 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 215.212.12.117 serverIP: 86.0.240.175 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"157.94.172.116","externalIp":"170.135.205.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=157.94.172.116 ::: serverIP=170.135.205.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"157.94.172.116\",\"externalIp\":\"170.135.205.179\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=157.94.172.116 ::: serverIP=170.135.205.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "157.94.172.116", "serverIP": "170.135.205.179", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"157.94.172.116","externalIp":"170.135.205.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=157.94.172.116 ::: serverIP=170.135.205.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"157.94.172.116","externalIp":"170.135.205.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=157.94.172.116 ::: serverIP=170.135.205.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 157.94.172.116 serverIP: 170.135.205.179 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.239.0.206","externalIp":"237.120.18.3","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.239.0.206 ::: serverIP=237.120.18.3 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"196.239.0.206\",\"externalIp\":\"237.120.18.3\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=196.239.0.206 ::: serverIP=237.120.18.3 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "196.239.0.206", "serverIP": "237.120.18.3", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.239.0.206","externalIp":"237.120.18.3","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.239.0.206 ::: serverIP=237.120.18.3 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.239.0.206","externalIp":"237.120.18.3","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.239.0.206 ::: serverIP=237.120.18.3 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 196.239.0.206 serverIP: 237.120.18.3 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.124.212.235","externalIp":"122.167.212.94","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.124.212.235 ::: serverIP=122.167.212.94 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"39.124.212.235\",\"externalIp\":\"122.167.212.94\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=39.124.212.235 ::: serverIP=122.167.212.94 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "39.124.212.235", "serverIP": "122.167.212.94", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.124.212.235","externalIp":"122.167.212.94","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.124.212.235 ::: serverIP=122.167.212.94 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.124.212.235","externalIp":"122.167.212.94","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.124.212.235 ::: serverIP=122.167.212.94 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 39.124.212.235 serverIP: 122.167.212.94 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"175.66.236.71","externalIp":"179.133.98.67","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=175.66.236.71 ::: serverIP=179.133.98.67 ::: userName=charlie ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"175.66.236.71\",\"externalIp\":\"179.133.98.67\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=175.66.236.71 ::: serverIP=179.133.98.67 ::: userName=charlie ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "175.66.236.71", "serverIP": "179.133.98.67", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"175.66.236.71","externalIp":"179.133.98.67","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=175.66.236.71 ::: serverIP=179.133.98.67 ::: userName=charlie ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"175.66.236.71","externalIp":"179.133.98.67","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=175.66.236.71 ::: serverIP=179.133.98.67 ::: userName=charlie ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 175.66.236.71 serverIP: 179.133.98.67 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.215.233.27","externalIp":"8.16.2.45","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.215.233.27 ::: serverIP=8.16.2.45 ::: userName=johndoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"196.215.233.27\",\"externalIp\":\"8.16.2.45\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=196.215.233.27 ::: serverIP=8.16.2.45 ::: userName=johndoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "196.215.233.27", "serverIP": "8.16.2.45", "userName": "johndoe" }
Create a JSON artifact from the message