input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=77.239.113.242 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=johndoe ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "KDHAMI-LT2.undefined",
"clientmac": "00ff0d992884",
"filehash": "d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d",
"filename": "lpksetup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3dd8398c7bda470895e756116d398bf5\",\"timestamp\":\"2023-11-08T03:51:04Z\",\"behavior_id\":\"458\",\"filename\":\"lpksetup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\lpksetup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\lpksetup.exe\\\" -Embedding\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-18\",\"control_graph_id\":\"ctg:3dd8398c7bda470895e756116d398bf5:12885618049\",\"triggering_process_graph_id\":\"pid:3dd8398c7bda470895e756116d398bf5:14819663752\",\"sha256\":\"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d\",\"md5\":\"4470c7350bb7f2d945cc405ec81985d2\",\"parent_details\":{\"parent_sha256\":\"\",\"parent_md5\":\"\",\"parent_cmdline\":\"\",\"parent_process_graph_id\":\"\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=77.239.113.242 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe ::: userName=johndoe ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-08T03:51:04Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "77.239.113.242",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=77.239.113.242 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=johndoe ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3dd8398c7bda470895e756116d398bf5","timestamp":"2023-11-08T03:51:04Z","behavior_id":"458","filename":"lpksetup.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\lpksetup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\lpksetup.exe\" -Embedding","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-18","control_graph_id":"ctg:3dd8398c7bda470895e756116d398bf5:12885618049","triggering_process_graph_id":"pid:3dd8398c7bda470895e756116d398bf5:14819663752","sha256":"d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d","md5":"4470c7350bb7f2d945cc405ec81985d2","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=77.239.113.242 ::: fileHash=d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d ::: fileName=lpksetup.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\lpksetup.exe ::: userName=johndoe ::: clientMAC=00ff0d992884 ::: created_at=2023-11-08T03:51:04Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-11-08T03:51:04Z ::: clientHostname=KDHAMI-LT2.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: KDHAMI-LT2.undefined
clientmac: 00ff0d992884
filehash: d44611189d3f2da01952291f40f7cf361e808b68716a4739b95dcdd632a26e5d
filename: lpksetup.exe
filepath: \Device\HarddiskVolume3\Windows\System32\lpksetup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-11-08T03:51:04Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 77.239.113.242
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=169.78.104.50 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=169.78.104.50 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-17T20:24:24Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "169.78.104.50",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=169.78.104.50 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=169.78.104.50 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18
filename: setup.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-17T20:24:24Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 169.78.104.50
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=182.180.19.64 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=182.180.19.64 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-17T20:24:24Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "182.180.19.64",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=182.180.19.64 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=182.180.19.64 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18
filename: setup.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-17T20:24:24Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 182.180.19.64
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.98.146.151 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=13.98.146.151 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-17T20:24:24Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "13.98.146.151",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.98.146.151 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.98.146.151 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18
filename: setup.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-17T20:24:24Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 13.98.146.151
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"98.62.163.160","externalIp":"76.88.60.186","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=98.62.163.160 ::: serverIP=76.88.60.186 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-31T15:53:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"98.62.163.160\",\"externalIp\":\"76.88.60.186\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T15:53:42.000Z\"} ::: clientIP=98.62.163.160 ::: serverIP=76.88.60.186 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "98.62.163.160",
"serverIP": "76.88.60.186",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"98.62.163.160","externalIp":"76.88.60.186","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=98.62.163.160 ::: serverIP=76.88.60.186 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"98.62.163.160","externalIp":"76.88.60.186","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=98.62.163.160 ::: serverIP=76.88.60.186 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-31T15:53:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 98.62.163.160
serverIP: 76.88.60.186
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.75.63.192","externalIp":"238.1.165.58","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=198.75.63.192 ::: serverIP=238.1.165.58 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-31T15:53:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"198.75.63.192\",\"externalIp\":\"238.1.165.58\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T15:53:42.000Z\"} ::: clientIP=198.75.63.192 ::: serverIP=238.1.165.58 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "198.75.63.192",
"serverIP": "238.1.165.58",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.75.63.192","externalIp":"238.1.165.58","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=198.75.63.192 ::: serverIP=238.1.165.58 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.75.63.192","externalIp":"238.1.165.58","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-31T15:53:42.000Z"} ::: clientIP=198.75.63.192 ::: serverIP=238.1.165.58 ::: userName=alice ::: created_at=2022-05-31T15:53:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T15:53:42.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-31T15:53:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 198.75.63.192
serverIP: 238.1.165.58
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"40.212.47.232","externalIp":"22.44.62.59","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=40.212.47.232 ::: serverIP=22.44.62.59 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T13:28:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410612144,\"originType\":\"AD Users\",\"internalIp\":\"40.212.47.232\",\"externalIp\":\"22.44.62.59\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:28:01.000Z\"} ::: clientIP=40.212.47.232 ::: serverIP=22.44.62.59 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "40.212.47.232",
"serverIP": "22.44.62.59",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"40.212.47.232","externalIp":"22.44.62.59","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=40.212.47.232 ::: serverIP=22.44.62.59 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"40.212.47.232","externalIp":"22.44.62.59","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=40.212.47.232 ::: serverIP=22.44.62.59 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T13:28:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 40.212.47.232
serverIP: 22.44.62.59
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"233.157.102.32","externalIp":"120.218.41.50","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=233.157.102.32 ::: serverIP=120.218.41.50 ::: userName=fish ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T13:28:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410612144,\"originType\":\"AD Users\",\"internalIp\":\"233.157.102.32\",\"externalIp\":\"120.218.41.50\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:28:01.000Z\"} ::: clientIP=233.157.102.32 ::: serverIP=120.218.41.50 ::: userName=fish ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "233.157.102.32",
"serverIP": "120.218.41.50",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"233.157.102.32","externalIp":"120.218.41.50","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=233.157.102.32 ::: serverIP=120.218.41.50 ::: userName=fish ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"233.157.102.32","externalIp":"120.218.41.50","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=233.157.102.32 ::: serverIP=120.218.41.50 ::: userName=fish ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T13:28:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 233.157.102.32
serverIP: 120.218.41.50
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"53.169.48.55","externalIp":"237.190.179.186","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=53.169.48.55 ::: serverIP=237.190.179.186 ::: userName=fish ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T13:16:00.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"53.169.48.55\",\"externalIp\":\"237.190.179.186\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:16:00.000Z\"} ::: clientIP=53.169.48.55 ::: serverIP=237.190.179.186 ::: userName=fish ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "53.169.48.55",
"serverIP": "237.190.179.186",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"53.169.48.55","externalIp":"237.190.179.186","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=53.169.48.55 ::: serverIP=237.190.179.186 ::: userName=fish ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"53.169.48.55","externalIp":"237.190.179.186","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=53.169.48.55 ::: serverIP=237.190.179.186 ::: userName=fish ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T13:16:00.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 53.169.48.55
serverIP: 237.190.179.186
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.197.106.145","externalIp":"79.255.246.192","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=149.197.106.145 ::: serverIP=79.255.246.192 ::: userName=charlie ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T13:16:00.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"149.197.106.145\",\"externalIp\":\"79.255.246.192\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:16:00.000Z\"} ::: clientIP=149.197.106.145 ::: serverIP=79.255.246.192 ::: userName=charlie ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "149.197.106.145",
"serverIP": "79.255.246.192",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.197.106.145","externalIp":"79.255.246.192","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=149.197.106.145 ::: serverIP=79.255.246.192 ::: userName=charlie ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.197.106.145","externalIp":"79.255.246.192","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T13:16:00.000Z"} ::: clientIP=149.197.106.145 ::: serverIP=79.255.246.192 ::: userName=charlie ::: created_at=2023-03-24T13:16:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:16:00.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T13:16:00.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 149.197.106.145
serverIP: 79.255.246.192
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"46.113.189.161","externalIp":"157.218.114.131","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=46.113.189.161 ::: serverIP=157.218.114.131 ::: userName=bob ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T12:02:04.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"46.113.189.161\",\"externalIp\":\"157.218.114.131\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T12:02:04.000Z\"} ::: clientIP=46.113.189.161 ::: serverIP=157.218.114.131 ::: userName=bob ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "46.113.189.161",
"serverIP": "157.218.114.131",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"46.113.189.161","externalIp":"157.218.114.131","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=46.113.189.161 ::: serverIP=157.218.114.131 ::: userName=bob ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"46.113.189.161","externalIp":"157.218.114.131","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=46.113.189.161 ::: serverIP=157.218.114.131 ::: userName=bob ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T12:02:04.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 46.113.189.161
serverIP: 157.218.114.131
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.44.55.182","externalIp":"130.7.118.102","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=169.44.55.182 ::: serverIP=130.7.118.102 ::: userName=charlie ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T12:02:04.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"169.44.55.182\",\"externalIp\":\"130.7.118.102\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T12:02:04.000Z\"} ::: clientIP=169.44.55.182 ::: serverIP=130.7.118.102 ::: userName=charlie ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "169.44.55.182",
"serverIP": "130.7.118.102",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.44.55.182","externalIp":"130.7.118.102","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=169.44.55.182 ::: serverIP=130.7.118.102 ::: userName=charlie ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.44.55.182","externalIp":"130.7.118.102","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T12:02:04.000Z"} ::: clientIP=169.44.55.182 ::: serverIP=130.7.118.102 ::: userName=charlie ::: created_at=2023-03-24T12:02:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T12:02:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T12:02:04.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 169.44.55.182
serverIP: 130.7.118.102
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"144.165.225.245","externalIp":"251.163.254.162","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=144.165.225.245 ::: serverIP=251.163.254.162 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T11:39:04.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"144.165.225.245\",\"externalIp\":\"251.163.254.162\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T11:39:04.000Z\"} ::: clientIP=144.165.225.245 ::: serverIP=251.163.254.162 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "144.165.225.245",
"serverIP": "251.163.254.162",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"144.165.225.245","externalIp":"251.163.254.162","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=144.165.225.245 ::: serverIP=251.163.254.162 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"144.165.225.245","externalIp":"251.163.254.162","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=144.165.225.245 ::: serverIP=251.163.254.162 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T11:39:04.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 144.165.225.245
serverIP: 251.163.254.162
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.128.255.175","externalIp":"224.86.151.181","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=71.128.255.175 ::: serverIP=224.86.151.181 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T11:39:04.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"71.128.255.175\",\"externalIp\":\"224.86.151.181\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T11:39:04.000Z\"} ::: clientIP=71.128.255.175 ::: serverIP=224.86.151.181 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "71.128.255.175",
"serverIP": "224.86.151.181",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.128.255.175","externalIp":"224.86.151.181","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=71.128.255.175 ::: serverIP=224.86.151.181 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.128.255.175","externalIp":"224.86.151.181","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=71.128.255.175 ::: serverIP=224.86.151.181 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T11:39:04.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 71.128.255.175
serverIP: 224.86.151.181
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"151.114.142.156","externalIp":"254.117.174.32","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=151.114.142.156 ::: serverIP=254.117.174.32 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T13:28:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410612144,\"originType\":\"AD Users\",\"internalIp\":\"151.114.142.156\",\"externalIp\":\"254.117.174.32\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:28:01.000Z\"} ::: clientIP=151.114.142.156 ::: serverIP=254.117.174.32 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "151.114.142.156",
"serverIP": "254.117.174.32",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"151.114.142.156","externalIp":"254.117.174.32","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=151.114.142.156 ::: serverIP=254.117.174.32 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"151.114.142.156","externalIp":"254.117.174.32","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=151.114.142.156 ::: serverIP=254.117.174.32 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T13:28:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 151.114.142.156
serverIP: 254.117.174.32
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"112.15.79.15","externalIp":"13.116.214.124","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=112.15.79.15 ::: serverIP=13.116.214.124 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T13:28:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410612144,\"originType\":\"AD Users\",\"internalIp\":\"112.15.79.15\",\"externalIp\":\"13.116.214.124\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T13:28:01.000Z\"} ::: clientIP=112.15.79.15 ::: serverIP=13.116.214.124 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "112.15.79.15",
"serverIP": "13.116.214.124",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"112.15.79.15","externalIp":"13.116.214.124","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=112.15.79.15 ::: serverIP=13.116.214.124 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":410612144,"originType":"AD Users","internalIp":"112.15.79.15","externalIp":"13.116.214.124","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-24T13:28:01.000Z"} ::: clientIP=112.15.79.15 ::: serverIP=13.116.214.124 ::: userName=nighthawk ::: created_at=2023-03-24T13:28:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T13:28:01.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T13:28:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 112.15.79.15
serverIP: 13.116.214.124
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"62.138.89.45","externalIp":"62.138.89.45","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=62.138.89.45 ::: serverIP=62.138.89.45 ::: userName=johndoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"62.138.89.45\",\"externalIp\":\"62.138.89.45\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=62.138.89.45 ::: serverIP=62.138.89.45 ::: userName=johndoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-02-06T03:54:46.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "62.138.89.45",
"serverIP": "248.109.16.120",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"62.138.89.45","externalIp":"62.138.89.45","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=62.138.89.45 ::: serverIP=62.138.89.45 ::: userName=johndoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"62.138.89.45","externalIp":"62.138.89.45","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=62.138.89.45 ::: serverIP=62.138.89.45 ::: userName=johndoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-02-06T03:54:46.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 62.138.89.45
serverIP: 248.109.16.120
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"10.172.128.96","externalIp":"10.172.128.96","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=10.172.128.96 ::: serverIP=10.172.128.96 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"10.172.128.96\",\"externalIp\":\"10.172.128.96\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=10.172.128.96 ::: serverIP=10.172.128.96 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-02-06T03:54:46.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "10.172.128.96",
"serverIP": "165.208.251.179",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"10.172.128.96","externalIp":"10.172.128.96","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=10.172.128.96 ::: serverIP=10.172.128.96 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"10.172.128.96","externalIp":"10.172.128.96","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=10.172.128.96 ::: serverIP=10.172.128.96 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-02-06T03:54:46.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 10.172.128.96
serverIP: 165.208.251.179
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"8.157.0.203","externalIp":"8.157.0.203","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=8.157.0.203 ::: serverIP=8.157.0.203 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"8.157.0.203\",\"externalIp\":\"8.157.0.203\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=8.157.0.203 ::: serverIP=8.157.0.203 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-02-06T03:54:46.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "8.157.0.203",
"serverIP": "180.46.20.131",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"8.157.0.203","externalIp":"8.157.0.203","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=8.157.0.203 ::: serverIP=8.157.0.203 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"8.157.0.203","externalIp":"8.157.0.203","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=8.157.0.203 ::: serverIP=8.157.0.203 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-02-06T03:54:46.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 8.157.0.203
serverIP: 180.46.20.131
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"138.46.11.106","externalIp":"138.46.11.106","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=138.46.11.106 ::: serverIP=138.46.11.106 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"138.46.11.106\",\"externalIp\":\"138.46.11.106\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=138.46.11.106 ::: serverIP=138.46.11.106 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-02-06T03:54:46.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "138.46.11.106",
"serverIP": "213.51.44.74",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"138.46.11.106","externalIp":"138.46.11.106","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=138.46.11.106 ::: serverIP=138.46.11.106 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"138.46.11.106","externalIp":"138.46.11.106","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=138.46.11.106 ::: serverIP=138.46.11.106 ::: userName=janedoe ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-02-06T03:54:46.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 138.46.11.106
serverIP: 213.51.44.74
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.55.119.212","externalIp":"155.55.119.212","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=155.55.119.212 ::: serverIP=155.55.119.212 ::: userName=fish ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"155.55.119.212\",\"externalIp\":\"155.55.119.212\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=155.55.119.212 ::: serverIP=155.55.119.212 ::: userName=fish ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "155.55.119.212",
"serverIP": "80.120.130.150",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.55.119.212","externalIp":"155.55.119.212","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=155.55.119.212 ::: serverIP=155.55.119.212 ::: userName=fish ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.55.119.212","externalIp":"155.55.119.212","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=155.55.119.212 ::: serverIP=155.55.119.212 ::: userName=fish ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 155.55.119.212
serverIP: 80.120.130.150
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"134.213.132.202","externalIp":"134.213.132.202","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=134.213.132.202 ::: serverIP=134.213.132.202 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"134.213.132.202\",\"externalIp\":\"134.213.132.202\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=134.213.132.202 ::: serverIP=134.213.132.202 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "134.213.132.202",
"serverIP": "210.111.110.221",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"134.213.132.202","externalIp":"134.213.132.202","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=134.213.132.202 ::: serverIP=134.213.132.202 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"134.213.132.202","externalIp":"134.213.132.202","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=134.213.132.202 ::: serverIP=134.213.132.202 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 134.213.132.202
serverIP: 210.111.110.221
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.6.76.151","externalIp":"255.6.76.151","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=255.6.76.151 ::: serverIP=255.6.76.151 ::: userName=johndoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"255.6.76.151\",\"externalIp\":\"255.6.76.151\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=255.6.76.151 ::: serverIP=255.6.76.151 ::: userName=johndoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "255.6.76.151",
"serverIP": "48.90.70.250",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.6.76.151","externalIp":"255.6.76.151","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=255.6.76.151 ::: serverIP=255.6.76.151 ::: userName=johndoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.6.76.151","externalIp":"255.6.76.151","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=255.6.76.151 ::: serverIP=255.6.76.151 ::: userName=johndoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 255.6.76.151
serverIP: 48.90.70.250
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"85.10.226.15","externalIp":"85.10.226.15","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=85.10.226.15 ::: serverIP=85.10.226.15 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"85.10.226.15\",\"externalIp\":\"85.10.226.15\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=85.10.226.15 ::: serverIP=85.10.226.15 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "85.10.226.15",
"serverIP": "216.226.244.190",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"85.10.226.15","externalIp":"85.10.226.15","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=85.10.226.15 ::: serverIP=85.10.226.15 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"85.10.226.15","externalIp":"85.10.226.15","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=85.10.226.15 ::: serverIP=85.10.226.15 ::: userName=alice ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 85.10.226.15
serverIP: 216.226.244.190
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"1.93.55.61","externalIp":"1.93.55.61","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=1.93.55.61 ::: serverIP=1.93.55.61 ::: userName=nighthawk ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"1.93.55.61\",\"externalIp\":\"1.93.55.61\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=1.93.55.61 ::: serverIP=1.93.55.61 ::: userName=nighthawk ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-02-06T03:54:46.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "1.93.55.61",
"serverIP": "155.198.205.25",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"1.93.55.61","externalIp":"1.93.55.61","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=1.93.55.61 ::: serverIP=1.93.55.61 ::: userName=nighthawk ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"1.93.55.61","externalIp":"1.93.55.61","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=1.93.55.61 ::: serverIP=1.93.55.61 ::: userName=nighthawk ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-02-06T03:54:46.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 1.93.55.61
serverIP: 155.198.205.25
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"198.73.30.65","externalIp":"198.73.30.65","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=198.73.30.65 ::: serverIP=198.73.30.65 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"198.73.30.65\",\"externalIp\":\"198.73.30.65\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-06T03:54:46.000Z\"} ::: clientIP=198.73.30.65 ::: serverIP=198.73.30.65 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-02-06T03:54:46.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "198.73.30.65",
"serverIP": "83.37.84.194",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"198.73.30.65","externalIp":"198.73.30.65","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=198.73.30.65 ::: serverIP=198.73.30.65 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"198.73.30.65","externalIp":"198.73.30.65","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-06T03:54:46.000Z"} ::: clientIP=198.73.30.65 ::: serverIP=198.73.30.65 ::: userName=bob ::: created_at=2023-02-06T03:54:46.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-06T03:54:46.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-02-06T03:54:46.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 198.73.30.65
serverIP: 83.37.84.194
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"183.151.44.35","externalIp":"183.151.44.35","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=183.151.44.35 ::: serverIP=183.151.44.35 ::: userName=janedoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"183.151.44.35\",\"externalIp\":\"183.151.44.35\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=183.151.44.35 ::: serverIP=183.151.44.35 ::: userName=janedoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "183.151.44.35",
"serverIP": "241.111.50.244",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"183.151.44.35","externalIp":"183.151.44.35","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=183.151.44.35 ::: serverIP=183.151.44.35 ::: userName=janedoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"183.151.44.35","externalIp":"183.151.44.35","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=183.151.44.35 ::: serverIP=183.151.44.35 ::: userName=janedoe ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 183.151.44.35
serverIP: 241.111.50.244
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"66.150.151.180","externalIp":"66.150.151.180","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=66.150.151.180 ::: serverIP=66.150.151.180 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"66.150.151.180\",\"externalIp\":\"66.150.151.180\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:01.000Z\"} ::: clientIP=66.150.151.180 ::: serverIP=66.150.151.180 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "66.150.151.180",
"serverIP": "65.152.153.222",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"66.150.151.180","externalIp":"66.150.151.180","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=66.150.151.180 ::: serverIP=66.150.151.180 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"66.150.151.180","externalIp":"66.150.151.180","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:01.000Z"} ::: clientIP=66.150.151.180 ::: serverIP=66.150.151.180 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:01.000Z ::: serverHostname=cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010frofpcca71q9d.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 66.150.151.180
serverIP: 65.152.153.222
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"215.212.12.117","externalIp":"86.0.240.175","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=215.212.12.117 ::: serverIP=86.0.240.175 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"215.212.12.117\",\"externalIp\":\"86.0.240.175\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=215.212.12.117 ::: serverIP=86.0.240.175 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "215.212.12.117",
"serverIP": "86.0.240.175",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"215.212.12.117","externalIp":"86.0.240.175","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=215.212.12.117 ::: serverIP=86.0.240.175 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"215.212.12.117","externalIp":"86.0.240.175","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=215.212.12.117 ::: serverIP=86.0.240.175 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 215.212.12.117
serverIP: 86.0.240.175
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"157.94.172.116","externalIp":"170.135.205.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=157.94.172.116 ::: serverIP=170.135.205.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"157.94.172.116\",\"externalIp\":\"170.135.205.179\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=157.94.172.116 ::: serverIP=170.135.205.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "157.94.172.116",
"serverIP": "170.135.205.179",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"157.94.172.116","externalIp":"170.135.205.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=157.94.172.116 ::: serverIP=170.135.205.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"157.94.172.116","externalIp":"170.135.205.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=157.94.172.116 ::: serverIP=170.135.205.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 157.94.172.116
serverIP: 170.135.205.179
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.239.0.206","externalIp":"237.120.18.3","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.239.0.206 ::: serverIP=237.120.18.3 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"196.239.0.206\",\"externalIp\":\"237.120.18.3\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=196.239.0.206 ::: serverIP=237.120.18.3 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "196.239.0.206",
"serverIP": "237.120.18.3",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.239.0.206","externalIp":"237.120.18.3","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.239.0.206 ::: serverIP=237.120.18.3 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.239.0.206","externalIp":"237.120.18.3","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.239.0.206 ::: serverIP=237.120.18.3 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 196.239.0.206
serverIP: 237.120.18.3
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.124.212.235","externalIp":"122.167.212.94","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.124.212.235 ::: serverIP=122.167.212.94 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"39.124.212.235\",\"externalIp\":\"122.167.212.94\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=39.124.212.235 ::: serverIP=122.167.212.94 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "39.124.212.235",
"serverIP": "122.167.212.94",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.124.212.235","externalIp":"122.167.212.94","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.124.212.235 ::: serverIP=122.167.212.94 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.124.212.235","externalIp":"122.167.212.94","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.124.212.235 ::: serverIP=122.167.212.94 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 39.124.212.235
serverIP: 122.167.212.94
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"175.66.236.71","externalIp":"179.133.98.67","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=175.66.236.71 ::: serverIP=179.133.98.67 ::: userName=charlie ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"175.66.236.71\",\"externalIp\":\"179.133.98.67\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=175.66.236.71 ::: serverIP=179.133.98.67 ::: userName=charlie ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "175.66.236.71",
"serverIP": "179.133.98.67",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"175.66.236.71","externalIp":"179.133.98.67","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=175.66.236.71 ::: serverIP=179.133.98.67 ::: userName=charlie ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"175.66.236.71","externalIp":"179.133.98.67","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=175.66.236.71 ::: serverIP=179.133.98.67 ::: userName=charlie ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 175.66.236.71
serverIP: 179.133.98.67
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.215.233.27","externalIp":"8.16.2.45","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.215.233.27 ::: serverIP=8.16.2.45 ::: userName=johndoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"196.215.233.27\",\"externalIp\":\"8.16.2.45\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=196.215.233.27 ::: serverIP=8.16.2.45 ::: userName=johndoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "196.215.233.27",
"serverIP": "8.16.2.45",
"userName": "johndoe"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.