input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<172>Feb 18 2023 12:56:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:37.245.124.17/62367 dst outside:254.130.57.191/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 18 2023 12:56:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:37.245.124.17/62367 dst outside:254.130.57.191/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 62367
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 37.245.124.17
serverIP: 254.130.57.191 | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=108.131.15.177 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:21:58Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" query HKLM/f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=108.131.15.177 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:21:58Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "108.131.15.177",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=108.131.15.177 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=108.131.15.177 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:21:58Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 108.131.15.177
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.128.208.13 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:21:58Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" query HKLM/f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=223.128.208.13 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:21:58Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "223.128.208.13",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.128.208.13 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.128.208.13 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:21:58Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 223.128.208.13
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=228.87.154.14 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:21:58Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" query HKLM/f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=228.87.154.14 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:21:58Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "228.87.154.14",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=228.87.154.14 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=228.87.154.14 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:21:58Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 228.87.154.14
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=168.125.124.29 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:25:24Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=168.125.124.29 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:25:24Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "168.125.124.29",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=168.125.124.29 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=168.125.124.29 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:25:24Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 168.125.124.29
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=97.178.181.218 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:25:24Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=97.178.181.218 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:25:24Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "97.178.181.218",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=97.178.181.218 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=97.178.181.218 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:25:24Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 97.178.181.218
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t94.154.131.229\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"94.154.131.229","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | {
"action": "Logon",
"clientport": 43656,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-10-05T22:04:53.425Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-05T22:04:55.023Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t94.154.131.229\\n\\tSource Port:\\t\\t43656\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"94.154.131.229\",\"IpPort\":\"43656\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":19584}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6410208278,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6410208278",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "94.154.131.229",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t94.154.131.229\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"94.154.131.229","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t94.154.131.229\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"94.154.131.229","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 43656
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6410208278
streamName: microsoft-windows-security-auditing
clientIP: 94.154.131.229
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t54.213.137.107\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"54.213.137.107","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | {
"action": "Logon",
"clientport": 43656,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-10-05T22:04:53.425Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-05T22:04:55.023Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t54.213.137.107\\n\\tSource Port:\\t\\t43656\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"54.213.137.107\",\"IpPort\":\"43656\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":19584}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6410208278,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6410208278",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "54.213.137.107",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t54.213.137.107\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"54.213.137.107","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t54.213.137.107\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"54.213.137.107","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 43656
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6410208278
streamName: microsoft-windows-security-auditing
clientIP: 54.213.137.107
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t101.241.112.205\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"101.241.112.205","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | {
"action": "Logon",
"clientport": 43656,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-10-05T22:04:53.425Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-05T22:04:55.023Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t101.241.112.205\\n\\tSource Port:\\t\\t43656\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"101.241.112.205\",\"IpPort\":\"43656\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":19584}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6410208278,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6410208278",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "101.241.112.205",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t101.241.112.205\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"101.241.112.205","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t101.241.112.205\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"101.241.112.205","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 43656
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6410208278
streamName: microsoft-windows-security-auditing
clientIP: 101.241.112.205
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t253.248.76.205\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"253.248.76.205","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | {
"action": "Logon",
"clientport": 43656,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-10-05T22:04:53.425Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-05T22:04:55.023Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t253.248.76.205\\n\\tSource Port:\\t\\t43656\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"253.248.76.205\",\"IpPort\":\"43656\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":19584}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6410208278,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6410208278",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "253.248.76.205",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t253.248.76.205\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"253.248.76.205","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-05T22:04:53.425Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-05T22:04:55.023Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t253.248.76.205\n\tSource Port:\t\t43656\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"253.248.76.205","IpPort":"43656","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6410208278,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 43656
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6410208278
streamName: microsoft-windows-security-auditing
clientIP: 253.248.76.205
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t215.77.63.145\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"215.77.63.145","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | {
"action": "Logon",
"clientport": 42470,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-24T02:15:38.569Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-24T02:15:39.344Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t215.77.63.145\\n\\tSource Port:\\t\\t42470\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"215.77.63.145\",\"IpPort\":\"42470\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":2944}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6963741905,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6963741905",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "215.77.63.145",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t215.77.63.145\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"215.77.63.145","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t215.77.63.145\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"215.77.63.145","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 42470
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6963741905
streamName: microsoft-windows-security-auditing
clientIP: 215.77.63.145
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t48.222.150.38\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"48.222.150.38","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | {
"action": "Logon",
"clientport": 42470,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-24T02:15:38.569Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-24T02:15:39.344Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t48.222.150.38\\n\\tSource Port:\\t\\t42470\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"48.222.150.38\",\"IpPort\":\"42470\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":2944}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6963741905,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6963741905",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "48.222.150.38",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t48.222.150.38\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"48.222.150.38","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t48.222.150.38\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"48.222.150.38","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 42470
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6963741905
streamName: microsoft-windows-security-auditing
clientIP: 48.222.150.38
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t228.205.64.218\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.205.64.218","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | {
"action": "Logon",
"clientport": 42470,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-24T02:15:38.569Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-24T02:15:39.344Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t228.205.64.218\\n\\tSource Port:\\t\\t42470\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"228.205.64.218\",\"IpPort\":\"42470\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":2944}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6963741905,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6963741905",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "228.205.64.218",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t228.205.64.218\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.205.64.218","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t228.205.64.218\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.205.64.218","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 42470
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6963741905
streamName: microsoft-windows-security-auditing
clientIP: 228.205.64.218
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t162.116.205.230\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"162.116.205.230","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | {
"action": "Logon",
"clientport": 42470,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-24T02:15:38.569Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-24T02:15:39.344Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t162.116.205.230\\n\\tSource Port:\\t\\t42470\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"162.116.205.230\",\"IpPort\":\"42470\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":2944}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6963741905,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6963741905",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "162.116.205.230",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t162.116.205.230\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"162.116.205.230","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-24T02:15:38.569Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-24T02:15:39.344Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t162.116.205.230\n\tSource Port:\t\t42470\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"162.116.205.230","IpPort":"42470","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":2944}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6963741905,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 42470
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6963741905
streamName: microsoft-windows-security-auditing
clientIP: 162.116.205.230
userName: $ | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"168.103.91.35","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=168.103.91.35 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=168.103.91.35 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com",
"emailsendingserver": "54.240.8.81",
"emailsubject": "Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"filehash": "<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>",
"filename": "from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatTime\":\"2023-11-24T20:28:10.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-24T20:26:28.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2411776,\"headerFrom\":\"sandiegoprivatebank AccessUpdate Via e-sgnDocu\u00ae <mind-might@kickoffpro.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mind-might@kickoffpro.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"elarson@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427\",\"md5\":\"f0dc6bbf26e9031c8ba39e8d8c76c52f\",\"filename\":\"6d18147275039ab69fbc5855c572c7b1.png\",\"sandboxStatus\":null,\"oContentType\":\"image/png\",\"contentType\":\"image/png\"},{\"disposition\":\"inline\",\"sha256\":\"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34\",\"md5\":\"e4708e715c4d5606ae063977625f13a9\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"85309ff8-4b69-741f-cf70-c18446811c14\",\"QID\":\"3uet0vtfgc-1\",\"GUID\":\"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N\",\"sender\":\"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com\",\"recipient\":[\"elarson@sandiegoprivatebank.net\"],\"senderIP\":\"168.103.91.35\",\"messageID\":\"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>\"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=168.103.91.35 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=168.103.91.35 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-24T20:26:28.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "168.103.91.35"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"168.103.91.35","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=168.103.91.35 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=168.103.91.35 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"168.103.91.35","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=168.103.91.35 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=168.103.91.35 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com
emailsendingserver: 54.240.8.81
emailsubject: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
filehash: <0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>
filename: from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-24T20:26:28.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 168.103.91.35 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"182.183.112.58","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=182.183.112.58 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=182.183.112.58 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com",
"emailsendingserver": "54.240.8.81",
"emailsubject": "Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"filehash": "<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>",
"filename": "from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatTime\":\"2023-11-24T20:28:10.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-24T20:26:28.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2411776,\"headerFrom\":\"sandiegoprivatebank AccessUpdate Via e-sgnDocu\u00ae <mind-might@kickoffpro.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mind-might@kickoffpro.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"elarson@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427\",\"md5\":\"f0dc6bbf26e9031c8ba39e8d8c76c52f\",\"filename\":\"6d18147275039ab69fbc5855c572c7b1.png\",\"sandboxStatus\":null,\"oContentType\":\"image/png\",\"contentType\":\"image/png\"},{\"disposition\":\"inline\",\"sha256\":\"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34\",\"md5\":\"e4708e715c4d5606ae063977625f13a9\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"85309ff8-4b69-741f-cf70-c18446811c14\",\"QID\":\"3uet0vtfgc-1\",\"GUID\":\"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N\",\"sender\":\"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com\",\"recipient\":[\"elarson@sandiegoprivatebank.net\"],\"senderIP\":\"182.183.112.58\",\"messageID\":\"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>\"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=182.183.112.58 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=182.183.112.58 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-24T20:26:28.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "182.183.112.58"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"182.183.112.58","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=182.183.112.58 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=182.183.112.58 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"182.183.112.58","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=182.183.112.58 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=182.183.112.58 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com
emailsendingserver: 54.240.8.81
emailsubject: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
filehash: <0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>
filename: from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-24T20:26:28.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 182.183.112.58 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"26.82.207.252","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=26.82.207.252 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=26.82.207.252 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com",
"emailsendingserver": "54.240.8.81",
"emailsubject": "Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"filehash": "<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>",
"filename": "from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatTime\":\"2023-11-24T20:28:10.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-24T20:26:28.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2411776,\"headerFrom\":\"sandiegoprivatebank AccessUpdate Via e-sgnDocu\u00ae <mind-might@kickoffpro.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mind-might@kickoffpro.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"elarson@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427\",\"md5\":\"f0dc6bbf26e9031c8ba39e8d8c76c52f\",\"filename\":\"6d18147275039ab69fbc5855c572c7b1.png\",\"sandboxStatus\":null,\"oContentType\":\"image/png\",\"contentType\":\"image/png\"},{\"disposition\":\"inline\",\"sha256\":\"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34\",\"md5\":\"e4708e715c4d5606ae063977625f13a9\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"85309ff8-4b69-741f-cf70-c18446811c14\",\"QID\":\"3uet0vtfgc-1\",\"GUID\":\"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N\",\"sender\":\"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com\",\"recipient\":[\"elarson@sandiegoprivatebank.net\"],\"senderIP\":\"26.82.207.252\",\"messageID\":\"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>\"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=26.82.207.252 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=26.82.207.252 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-24T20:26:28.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "26.82.207.252"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"26.82.207.252","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=26.82.207.252 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=26.82.207.252 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"26.82.207.252","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=26.82.207.252 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=26.82.207.252 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com
emailsendingserver: 54.240.8.81
emailsubject: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
filehash: <0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>
filename: from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-24T20:26:28.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 26.82.207.252 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"62.183.111.15","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=62.183.111.15 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=62.183.111.15 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com",
"emailsendingserver": "54.240.8.81",
"emailsubject": "Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"filehash": "<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>",
"filename": "from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatTime\":\"2023-11-24T20:28:10.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-24T20:26:28.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2411776,\"headerFrom\":\"sandiegoprivatebank AccessUpdate Via e-sgnDocu\u00ae <mind-might@kickoffpro.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mind-might@kickoffpro.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"elarson@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427\",\"md5\":\"f0dc6bbf26e9031c8ba39e8d8c76c52f\",\"filename\":\"6d18147275039ab69fbc5855c572c7b1.png\",\"sandboxStatus\":null,\"oContentType\":\"image/png\",\"contentType\":\"image/png\"},{\"disposition\":\"inline\",\"sha256\":\"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34\",\"md5\":\"e4708e715c4d5606ae063977625f13a9\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"85309ff8-4b69-741f-cf70-c18446811c14\",\"QID\":\"3uet0vtfgc-1\",\"GUID\":\"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N\",\"sender\":\"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com\",\"recipient\":[\"elarson@sandiegoprivatebank.net\"],\"senderIP\":\"62.183.111.15\",\"messageID\":\"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>\"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=62.183.111.15 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=62.183.111.15 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-24T20:26:28.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "62.183.111.15"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"62.183.111.15","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=62.183.111.15 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=62.183.111.15 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"62.183.111.15","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=62.183.111.15 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=62.183.111.15 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com
emailsendingserver: 54.240.8.81
emailsubject: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
filehash: <0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>
filename: from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-24T20:26:28.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 62.183.111.15 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"95.191.224.138","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=95.191.224.138 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=95.191.224.138 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com",
"emailsendingserver": "54.240.8.81",
"emailsubject": "Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"filehash": "<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>",
"filename": "from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatTime\":\"2023-11-24T20:28:10.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-24T20:26:28.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2411776,\"headerFrom\":\"sandiegoprivatebank AccessUpdate Via e-sgnDocu\u00ae <mind-might@kickoffpro.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mind-might@kickoffpro.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"elarson@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427\",\"md5\":\"f0dc6bbf26e9031c8ba39e8d8c76c52f\",\"filename\":\"6d18147275039ab69fbc5855c572c7b1.png\",\"sandboxStatus\":null,\"oContentType\":\"image/png\",\"contentType\":\"image/png\"},{\"disposition\":\"inline\",\"sha256\":\"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34\",\"md5\":\"e4708e715c4d5606ae063977625f13a9\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"85309ff8-4b69-741f-cf70-c18446811c14\",\"QID\":\"3uet0vtfgc-1\",\"GUID\":\"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N\",\"sender\":\"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com\",\"recipient\":[\"elarson@sandiegoprivatebank.net\"],\"senderIP\":\"95.191.224.138\",\"messageID\":\"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>\"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=95.191.224.138 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=95.191.224.138 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-24T20:26:28.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "95.191.224.138"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"95.191.224.138","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=95.191.224.138 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=95.191.224.138 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"95.191.224.138","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=95.191.224.138 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=95.191.224.138 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com
emailsendingserver: 54.240.8.81
emailsubject: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
filehash: <0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>
filename: from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-24T20:26:28.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 95.191.224.138 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"99.235.115.32","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=99.235.115.32 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=99.235.115.32 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com",
"emailsendingserver": "54.240.8.81",
"emailsubject": "Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"filehash": "<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>",
"filename": "from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatTime\":\"2023-11-24T20:28:10.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-24T20:26:28.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2411776,\"headerFrom\":\"sandiegoprivatebank AccessUpdate Via e-sgnDocu\u00ae <mind-might@kickoffpro.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mind-might@kickoffpro.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"elarson@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427\",\"md5\":\"f0dc6bbf26e9031c8ba39e8d8c76c52f\",\"filename\":\"6d18147275039ab69fbc5855c572c7b1.png\",\"sandboxStatus\":null,\"oContentType\":\"image/png\",\"contentType\":\"image/png\"},{\"disposition\":\"inline\",\"sha256\":\"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34\",\"md5\":\"e4708e715c4d5606ae063977625f13a9\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"85309ff8-4b69-741f-cf70-c18446811c14\",\"QID\":\"3uet0vtfgc-1\",\"GUID\":\"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N\",\"sender\":\"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com\",\"recipient\":[\"elarson@sandiegoprivatebank.net\"],\"senderIP\":\"99.235.115.32\",\"messageID\":\"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>\"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=99.235.115.32 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=99.235.115.32 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-24T20:26:28.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "99.235.115.32"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"99.235.115.32","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=99.235.115.32 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=99.235.115.32 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"99.235.115.32","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=99.235.115.32 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=99.235.115.32 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com
emailsendingserver: 54.240.8.81
emailsubject: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
filehash: <0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>
filename: from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-24T20:26:28.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 99.235.115.32 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"254.198.100.154","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=254.198.100.154 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=254.198.100.154 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com",
"emailsendingserver": "54.240.8.81",
"emailsubject": "Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"filehash": "<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>",
"filename": "from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatTime\":\"2023-11-24T20:28:10.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-24T20:26:28.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2411776,\"headerFrom\":\"sandiegoprivatebank AccessUpdate Via e-sgnDocu\u00ae <mind-might@kickoffpro.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mind-might@kickoffpro.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"elarson@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427\",\"md5\":\"f0dc6bbf26e9031c8ba39e8d8c76c52f\",\"filename\":\"6d18147275039ab69fbc5855c572c7b1.png\",\"sandboxStatus\":null,\"oContentType\":\"image/png\",\"contentType\":\"image/png\"},{\"disposition\":\"inline\",\"sha256\":\"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34\",\"md5\":\"e4708e715c4d5606ae063977625f13a9\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"85309ff8-4b69-741f-cf70-c18446811c14\",\"QID\":\"3uet0vtfgc-1\",\"GUID\":\"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N\",\"sender\":\"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com\",\"recipient\":[\"elarson@sandiegoprivatebank.net\"],\"senderIP\":\"254.198.100.154\",\"messageID\":\"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>\"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=254.198.100.154 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=254.198.100.154 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-24T20:26:28.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "254.198.100.154"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"254.198.100.154","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=254.198.100.154 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=254.198.100.154 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"254.198.100.154","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=254.198.100.154 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=254.198.100.154 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com
emailsendingserver: 54.240.8.81
emailsubject: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
filehash: <0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>
filename: from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-24T20:26:28.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 254.198.100.154 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"42.82.42.17","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=42.82.42.17 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=42.82.42.17 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com",
"emailsendingserver": "54.240.8.81",
"emailsubject": "Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"filehash": "<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>",
"filename": "from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3\",\"threatTime\":\"2023-11-24T20:28:10.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-24T20:26:28.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2411776,\"headerFrom\":\"sandiegoprivatebank AccessUpdate Via e-sgnDocu\u00ae <mind-might@kickoffpro.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mind-might@kickoffpro.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"elarson@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427\",\"md5\":\"f0dc6bbf26e9031c8ba39e8d8c76c52f\",\"filename\":\"6d18147275039ab69fbc5855c572c7b1.png\",\"sandboxStatus\":null,\"oContentType\":\"image/png\",\"contentType\":\"image/png\"},{\"disposition\":\"inline\",\"sha256\":\"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34\",\"md5\":\"e4708e715c4d5606ae063977625f13a9\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"85309ff8-4b69-741f-cf70-c18446811c14\",\"QID\":\"3uet0vtfgc-1\",\"GUID\":\"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N\",\"sender\":\"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com\",\"recipient\":[\"elarson@sandiegoprivatebank.net\"],\"senderIP\":\"42.82.42.17\",\"messageID\":\"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>\"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=42.82.42.17 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=42.82.42.17 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-24T20:26:28.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "42.82.42.17"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"42.82.42.17","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=42.82.42.17 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=42.82.42.17 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/44ad44b75ba6a67e2afe94270e9d731e9fa8c90ab872aa2918ee9ddaa5284ee3","threatTime":"2023-11-24T20:28:10.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https://bakedbyt.com/new/auth/wjxn/ZWxhcnNvbkBzYW5kaWVnb3ByaXZhdGViYW5rLm5ldA==","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-24T20:26:28.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2411776,"headerFrom":"sandiegoprivatebank AccessUpdate Via e-sgnDocu® <mind-might@kickoffpro.com>","headerReplyTo":null,"fromAddress":["mind-might@kickoffpro.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["elarson@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2841dfa0b30c141d485d37cbdbadada3cd433d723f54a62b66ffad8cccd6427","md5":"f0dc6bbf26e9031c8ba39e8d8c76c52f","filename":"6d18147275039ab69fbc5855c572c7b1.png","sandboxStatus":null,"oContentType":"image/png","contentType":"image/png"},{"disposition":"inline","sha256":"fd146260e298801a306932d232970a8aff33e2915ad9166b35f1d792a5723d34","md5":"e4708e715c4d5606ae063977625f13a9","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"85309ff8-4b69-741f-cf70-c18446811c14","QID":"3uet0vtfgc-1","GUID":"AVuLhs5DH06KlI-mp-M94U_nU5vliB2N","sender":"0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com","recipient":["elarson@sandiegoprivatebank.net"],"senderIP":"42.82.42.17","messageID":"<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>"} ::: fileHash=<0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com> ::: fileName=from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: serverIP=42.82.42.17 ::: emailFrom=0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com ::: created_at=2023-11-24T20:26:28.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-24T20:26:28.000Z ::: emailSendingServer=42.82.42.17 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com
emailsendingserver: 54.240.8.81
emailsubject: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
filehash: <0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@email.amazonses.com>
filename: from: 0100018c030326f8-92c8ba8b-655b-4b3b-b2cd-0eb90e6c3769-000000@amazonses.com subj: Action Required: sandiegoprivatebank Reminder On Saturday, November 25, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-24T20:26:28.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 42.82.42.17 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"140.225.58.209","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=140.225.58.209 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=140.225.58.209 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "kristen@safetynailer.com",
"emailsendingserver": "40.107.244.78",
"emailsubject": "Sign Notification Monday, November 20, 2023",
"filehash": "<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>",
"filename": "from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-20T17:18:15.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Sign Notification Monday, November 20, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":145313,\"headerFrom\":\"\\\"OnlineDocument Via eSign\\\" <Kristen@safetynailer.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"kristen@safetynailer.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"eaustria@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d\",\"md5\":\"71c169d0405b37a9bc562e936441452c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9\",\"md5\":\"f59f7d4f88a1df982ecece30cbd350ea\",\"filename\":\"doc09332-3833.jpg\",\"sandboxStatus\":null,\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5\",\"md5\":\"b723f334b32465cde7fdaf1f28c677fa\",\"filename\":\"text.txt\",\"sandboxStatus\":null,\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"}],\"completelyRewritten\":false,\"id\":\"d3929a9e-7669-360a-bdc9-1b41a0920c4b\",\"QID\":\"3uet0vrr3t-1\",\"GUID\":\"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU\",\"sender\":\"kristen@safetynailer.com\",\"recipient\":[\"eaustria@oscorp.bank\"],\"senderIP\":\"140.225.58.209\",\"messageID\":\"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>\"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=140.225.58.209 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=140.225.58.209 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-20T17:18:15.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "140.225.58.209"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"140.225.58.209","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=140.225.58.209 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=140.225.58.209 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"140.225.58.209","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=140.225.58.209 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=140.225.58.209 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: kristen@safetynailer.com
emailsendingserver: 40.107.244.78
emailsubject: Sign Notification Monday, November 20, 2023
filehash: <201020231118092468B0F4E4$75CAFE060F@safetynailer.com>
filename: from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-20T17:18:15.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 140.225.58.209 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@umbrella.bank"],"senderIP":"49.187.76.194","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=49.187.76.194 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=49.187.76.194 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "kristen@safetynailer.com",
"emailsendingserver": "40.107.244.78",
"emailsubject": "Sign Notification Monday, November 20, 2023",
"filehash": "<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>",
"filename": "from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-20T17:18:15.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Sign Notification Monday, November 20, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":145313,\"headerFrom\":\"\\\"OnlineDocument Via eSign\\\" <Kristen@safetynailer.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"kristen@safetynailer.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"eaustria@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d\",\"md5\":\"71c169d0405b37a9bc562e936441452c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9\",\"md5\":\"f59f7d4f88a1df982ecece30cbd350ea\",\"filename\":\"doc09332-3833.jpg\",\"sandboxStatus\":null,\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5\",\"md5\":\"b723f334b32465cde7fdaf1f28c677fa\",\"filename\":\"text.txt\",\"sandboxStatus\":null,\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"}],\"completelyRewritten\":false,\"id\":\"d3929a9e-7669-360a-bdc9-1b41a0920c4b\",\"QID\":\"3uet0vrr3t-1\",\"GUID\":\"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU\",\"sender\":\"kristen@safetynailer.com\",\"recipient\":[\"eaustria@umbrella.bank\"],\"senderIP\":\"49.187.76.194\",\"messageID\":\"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>\"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=49.187.76.194 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=49.187.76.194 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-20T17:18:15.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "49.187.76.194"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@umbrella.bank"],"senderIP":"49.187.76.194","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=49.187.76.194 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=49.187.76.194 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsumbrellaiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@umbrella.bank"],"senderIP":"49.187.76.194","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=49.187.76.194 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=49.187.76.194 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: kristen@safetynailer.com
emailsendingserver: 40.107.244.78
emailsubject: Sign Notification Monday, November 20, 2023
filehash: <201020231118092468B0F4E4$75CAFE060F@safetynailer.com>
filename: from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-20T17:18:15.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 49.187.76.194 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"195.55.63.219","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=195.55.63.219 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=195.55.63.219 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "kristen@safetynailer.com",
"emailsendingserver": "40.107.244.78",
"emailsubject": "Sign Notification Monday, November 20, 2023",
"filehash": "<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>",
"filename": "from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-20T17:18:15.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Sign Notification Monday, November 20, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":145313,\"headerFrom\":\"\\\"OnlineDocument Via eSign\\\" <Kristen@safetynailer.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"kristen@safetynailer.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"eaustria@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d\",\"md5\":\"71c169d0405b37a9bc562e936441452c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9\",\"md5\":\"f59f7d4f88a1df982ecece30cbd350ea\",\"filename\":\"doc09332-3833.jpg\",\"sandboxStatus\":null,\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5\",\"md5\":\"b723f334b32465cde7fdaf1f28c677fa\",\"filename\":\"text.txt\",\"sandboxStatus\":null,\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"}],\"completelyRewritten\":false,\"id\":\"d3929a9e-7669-360a-bdc9-1b41a0920c4b\",\"QID\":\"3uet0vrr3t-1\",\"GUID\":\"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU\",\"sender\":\"kristen@safetynailer.com\",\"recipient\":[\"eaustria@oscorp.bank\"],\"senderIP\":\"195.55.63.219\",\"messageID\":\"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>\"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=195.55.63.219 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=195.55.63.219 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-20T17:18:15.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "195.55.63.219"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"195.55.63.219","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=195.55.63.219 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=195.55.63.219 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"195.55.63.219","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=195.55.63.219 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=195.55.63.219 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: kristen@safetynailer.com
emailsendingserver: 40.107.244.78
emailsubject: Sign Notification Monday, November 20, 2023
filehash: <201020231118092468B0F4E4$75CAFE060F@safetynailer.com>
filename: from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-20T17:18:15.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 195.55.63.219 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@stark.bank"],"senderIP":"7.174.176.251","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=7.174.176.251 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=7.174.176.251 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "kristen@safetynailer.com",
"emailsendingserver": "40.107.244.78",
"emailsubject": "Sign Notification Monday, November 20, 2023",
"filehash": "<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>",
"filename": "from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-20T17:18:15.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Sign Notification Monday, November 20, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":145313,\"headerFrom\":\"\\\"OnlineDocument Via eSign\\\" <Kristen@safetynailer.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"kristen@safetynailer.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"eaustria@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d\",\"md5\":\"71c169d0405b37a9bc562e936441452c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9\",\"md5\":\"f59f7d4f88a1df982ecece30cbd350ea\",\"filename\":\"doc09332-3833.jpg\",\"sandboxStatus\":null,\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5\",\"md5\":\"b723f334b32465cde7fdaf1f28c677fa\",\"filename\":\"text.txt\",\"sandboxStatus\":null,\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"}],\"completelyRewritten\":false,\"id\":\"d3929a9e-7669-360a-bdc9-1b41a0920c4b\",\"QID\":\"3uet0vrr3t-1\",\"GUID\":\"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU\",\"sender\":\"kristen@safetynailer.com\",\"recipient\":[\"eaustria@stark.bank\"],\"senderIP\":\"7.174.176.251\",\"messageID\":\"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>\"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=7.174.176.251 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=7.174.176.251 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-20T17:18:15.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "7.174.176.251"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@stark.bank"],"senderIP":"7.174.176.251","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=7.174.176.251 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=7.174.176.251 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsstarkiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@stark.bank"],"senderIP":"7.174.176.251","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=7.174.176.251 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=7.174.176.251 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: kristen@safetynailer.com
emailsendingserver: 40.107.244.78
emailsubject: Sign Notification Monday, November 20, 2023
filehash: <201020231118092468B0F4E4$75CAFE060F@safetynailer.com>
filename: from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-20T17:18:15.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 7.174.176.251 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@wayne.bank"],"senderIP":"174.84.178.173","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=174.84.178.173 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=174.84.178.173 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "kristen@safetynailer.com",
"emailsendingserver": "40.107.244.78",
"emailsubject": "Sign Notification Monday, November 20, 2023",
"filehash": "<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>",
"filename": "from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-20T17:18:15.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"Sign Notification Monday, November 20, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":145313,\"headerFrom\":\"\\\"OnlineDocument Via eSign\\\" <Kristen@safetynailer.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"kristen@safetynailer.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"eaustria@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d\",\"md5\":\"71c169d0405b37a9bc562e936441452c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9\",\"md5\":\"f59f7d4f88a1df982ecece30cbd350ea\",\"filename\":\"doc09332-3833.jpg\",\"sandboxStatus\":null,\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5\",\"md5\":\"b723f334b32465cde7fdaf1f28c677fa\",\"filename\":\"text.txt\",\"sandboxStatus\":null,\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"}],\"completelyRewritten\":false,\"id\":\"d3929a9e-7669-360a-bdc9-1b41a0920c4b\",\"QID\":\"3uet0vrr3t-1\",\"GUID\":\"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU\",\"sender\":\"kristen@safetynailer.com\",\"recipient\":[\"eaustria@wayne.bank\"],\"senderIP\":\"174.84.178.173\",\"messageID\":\"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>\"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=174.84.178.173 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=174.84.178.173 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-20T17:18:15.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "174.84.178.173"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@wayne.bank"],"senderIP":"174.84.178.173","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=174.84.178.173 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=174.84.178.173 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAswayneiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@wayne.bank"],"senderIP":"174.84.178.173","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=174.84.178.173 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=174.84.178.173 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: kristen@safetynailer.com
emailsendingserver: 40.107.244.78
emailsubject: Sign Notification Monday, November 20, 2023
filehash: <201020231118092468B0F4E4$75CAFE060F@safetynailer.com>
filename: from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-20T17:18:15.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 174.84.178.173 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@acme.bank"],"senderIP":"41.86.140.90","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=41.86.140.90 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=41.86.140.90 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "kristen@safetynailer.com",
"emailsendingserver": "40.107.244.78",
"emailsubject": "Sign Notification Monday, November 20, 2023",
"filehash": "<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>",
"filename": "from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-20T17:18:15.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Sign Notification Monday, November 20, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":145313,\"headerFrom\":\"\\\"OnlineDocument Via eSign\\\" <Kristen@safetynailer.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"kristen@safetynailer.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"eaustria@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d\",\"md5\":\"71c169d0405b37a9bc562e936441452c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attacmeed\",\"sha256\":\"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9\",\"md5\":\"f59f7d4f88a1df982ecece30cbd350ea\",\"filename\":\"doc09332-3833.jpg\",\"sandboxStatus\":null,\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5\",\"md5\":\"b723f334b32465cde7fdaf1f28c677fa\",\"filename\":\"text.txt\",\"sandboxStatus\":null,\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"}],\"completelyRewritten\":false,\"id\":\"d3929a9e-7669-360a-bdc9-1b41a0920c4b\",\"QID\":\"3uet0vrr3t-1\",\"GUID\":\"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU\",\"sender\":\"kristen@safetynailer.com\",\"recipient\":[\"eaustria@acme.bank\"],\"senderIP\":\"41.86.140.90\",\"messageID\":\"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>\"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=41.86.140.90 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=41.86.140.90 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-20T17:18:15.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "41.86.140.90"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@acme.bank"],"senderIP":"41.86.140.90","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=41.86.140.90 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=41.86.140.90 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@acme.bank"],"senderIP":"41.86.140.90","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=41.86.140.90 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=41.86.140.90 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: kristen@safetynailer.com
emailsendingserver: 40.107.244.78
emailsubject: Sign Notification Monday, November 20, 2023
filehash: <201020231118092468B0F4E4$75CAFE060F@safetynailer.com>
filename: from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-20T17:18:15.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 41.86.140.90 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@acme.bank"],"senderIP":"191.148.248.217","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=191.148.248.217 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=191.148.248.217 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "kristen@safetynailer.com",
"emailsendingserver": "40.107.244.78",
"emailsubject": "Sign Notification Monday, November 20, 2023",
"filehash": "<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>",
"filename": "from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-20T17:18:15.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Sign Notification Monday, November 20, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":145313,\"headerFrom\":\"\\\"OnlineDocument Via eSign\\\" <Kristen@safetynailer.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"kristen@safetynailer.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"eaustria@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d\",\"md5\":\"71c169d0405b37a9bc562e936441452c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attacmeed\",\"sha256\":\"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9\",\"md5\":\"f59f7d4f88a1df982ecece30cbd350ea\",\"filename\":\"doc09332-3833.jpg\",\"sandboxStatus\":null,\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5\",\"md5\":\"b723f334b32465cde7fdaf1f28c677fa\",\"filename\":\"text.txt\",\"sandboxStatus\":null,\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"}],\"completelyRewritten\":false,\"id\":\"d3929a9e-7669-360a-bdc9-1b41a0920c4b\",\"QID\":\"3uet0vrr3t-1\",\"GUID\":\"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU\",\"sender\":\"kristen@safetynailer.com\",\"recipient\":[\"eaustria@acme.bank\"],\"senderIP\":\"191.148.248.217\",\"messageID\":\"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>\"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=191.148.248.217 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=191.148.248.217 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-20T17:18:15.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "191.148.248.217"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@acme.bank"],"senderIP":"191.148.248.217","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=191.148.248.217 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=191.148.248.217 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsacmeiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@acme.bank"],"senderIP":"191.148.248.217","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=191.148.248.217 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=191.148.248.217 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: kristen@safetynailer.com
emailsendingserver: 40.107.244.78
emailsubject: Sign Notification Monday, November 20, 2023
filehash: <201020231118092468B0F4E4$75CAFE060F@safetynailer.com>
filename: from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-20T17:18:15.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 191.148.248.217 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"132.13.208.38","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=132.13.208.38 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=132.13.208.38 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "kristen@safetynailer.com",
"emailsendingserver": "40.107.244.78",
"emailsubject": "Sign Notification Monday, November 20, 2023",
"filehash": "<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>",
"filename": "from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac\",\"threatTime\":\"2023-11-20T17:21:40.000Z\",\"threat\":\"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-20T17:18:15.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Sign Notification Monday, November 20, 2023\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":145313,\"headerFrom\":\"\\\"OnlineDocument Via eSign\\\" <Kristen@safetynailer.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"kristen@safetynailer.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"eaustria@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d\",\"md5\":\"71c169d0405b37a9bc562e936441452c\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9\",\"md5\":\"f59f7d4f88a1df982ecece30cbd350ea\",\"filename\":\"doc09332-3833.jpg\",\"sandboxStatus\":null,\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5\",\"md5\":\"b723f334b32465cde7fdaf1f28c677fa\",\"filename\":\"text.txt\",\"sandboxStatus\":null,\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"}],\"completelyRewritten\":false,\"id\":\"d3929a9e-7669-360a-bdc9-1b41a0920c4b\",\"QID\":\"3uet0vrr3t-1\",\"GUID\":\"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU\",\"sender\":\"kristen@safetynailer.com\",\"recipient\":[\"eaustria@oscorp.bank\"],\"senderIP\":\"132.13.208.38\",\"messageID\":\"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>\"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=132.13.208.38 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=132.13.208.38 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-20T17:18:15.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "132.13.208.38"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"132.13.208.38","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=132.13.208.38 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=132.13.208.38 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8654f984b93701b700e74707ced2f1698f89717cc8475c5e5d84b28f3bf12572","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2F4nycba%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"},{"threatID":"fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/fdf51785381608446a61d9ca7cd55acb1822ff656aa057039bdff631f217d6ac","threatTime":"2023-11-20T17:21:40.000Z","threat":"https://events.bizzabo.com/auth/emailAsoscorpiatedLogin/verifyTokenAndRedirect?token=S9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-dklFn2bExx7385&eventGroupId=26969&redirectUrl=https%3A%2F%2Fmycityadvertising.com%2Femail%2Fverification%2Fpsy8g2%2F%2F%2F%2FZWF1c3RyaWFAY2FscHJpdmF0ZS5iYW5r","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-20T17:18:15.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Sign Notification Monday, November 20, 2023","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","spam","dmarc","urldefense"],"messageSize":145313,"headerFrom":"\"OnlineDocument Via eSign\" <Kristen@safetynailer.com>","headerReplyTo":null,"fromAddress":["kristen@safetynailer.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["eaustria@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"0e901243c301e9b1282fe4221dcf60d3eeb085305bbd665b550481322a27684d","md5":"71c169d0405b37a9bc562e936441452c","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"8d0af4b42358f354ca4b9521d0ae584f02b785183334a9ef698ab76f7dad0ee9","md5":"f59f7d4f88a1df982ecece30cbd350ea","filename":"doc09332-3833.jpg","sandboxStatus":null,"oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"fcef4dfb144118db9da5926b679c48c9b0335f4658190e44f22c384dee630ed5","md5":"b723f334b32465cde7fdaf1f28c677fa","filename":"text.txt","sandboxStatus":null,"oContentType":"text/plain","contentType":"text/plain"}],"completelyRewritten":false,"id":"d3929a9e-7669-360a-bdc9-1b41a0920c4b","QID":"3uet0vrr3t-1","GUID":"sEYGHYMZM5r3U6csO0FDCXrRUcn-NYiU","sender":"kristen@safetynailer.com","recipient":["eaustria@oscorp.bank"],"senderIP":"132.13.208.38","messageID":"<201020231118092468B0F4E4$75CAFE060F@safetynailer.com>"} ::: fileHash=<201020231118092468B0F4E4$75CAFE060F@safetynailer.com> ::: fileName=from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023 ::: serverIP=132.13.208.38 ::: emailFrom=kristen@safetynailer.com ::: created_at=2023-11-20T17:18:15.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Sign Notification Monday, November 20, 2023 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-20T17:18:15.000Z ::: emailSendingServer=132.13.208.38 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: kristen@safetynailer.com
emailsendingserver: 40.107.244.78
emailsubject: Sign Notification Monday, November 20, 2023
filehash: <201020231118092468B0F4E4$75CAFE060F@safetynailer.com>
filename: from: kristen@safetynailer.com subj: Sign Notification Monday, November 20, 2023
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-20T17:18:15.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 132.13.208.38 | Explain this syslog message |
<172>Feb 06 2023 13:39:33 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:170.34.111.222/58483 dst outside:250.22.228.231/54443 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 54443,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 06 2023 13:39:33 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:170.34.111.222/58483 dst outside:250.22.228.231/54443 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 58483,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "170.34.111.222",
"serverIP": "250.22.228.231"
} | Create a JSON artifact from the message |
<172>Feb 06 2023 13:39:33 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:170.34.111.222/58483 dst outside:250.22.228.231/54443 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 06 2023 13:39:33 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:170.34.111.222/58483 dst outside:250.22.228.231/54443 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 54443
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 58483
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 170.34.111.222
serverIP: 250.22.228.231 | Explain this syslog message |
<172>Feb 06 2023 13:39:33 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:141.240.58.235/58483 dst outside:65.69.184.67/54443 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 54443,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 06 2023 13:39:33 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:141.240.58.235/58483 dst outside:65.69.184.67/54443 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 58483,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "141.240.58.235",
"serverIP": "65.69.184.67"
} | Create a JSON artifact from the message |
<172>Feb 06 2023 13:39:33 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:141.240.58.235/58483 dst outside:65.69.184.67/54443 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 06 2023 13:39:33 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:141.240.58.235/58483 dst outside:65.69.184.67/54443 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 54443
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 58483
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 141.240.58.235
serverIP: 65.69.184.67 | Explain this syslog message |
<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:70.8.189.65 dst inside:217.172.156.67 (type 11, code 0) by access-group "outside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:70.8.189.65 dst inside:217.172.156.67 (type 11, code 0) by access-group \"outside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "70.8.189.65",
"serverIP": "217.172.156.67"
} | Create a JSON artifact from the message |
<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:70.8.189.65 dst inside:217.172.156.67 (type 11, code 0) by access-group "outside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:70.8.189.65 dst inside:217.172.156.67 (type 11, code 0) by access-group "outside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
vendorcode: PIX-4-106023
action: block
protocol: 1
facilitycode: 21
streamName: cisco_pix
clientIP: 70.8.189.65
serverIP: 217.172.156.67 | Explain this syslog message |
<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:16.200.121.237 dst inside:212.95.58.70 (type 11, code 0) by access-group "outside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:16.200.121.237 dst inside:212.95.58.70 (type 11, code 0) by access-group \"outside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "16.200.121.237",
"serverIP": "212.95.58.70"
} | Create a JSON artifact from the message |
<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:16.200.121.237 dst inside:212.95.58.70 (type 11, code 0) by access-group "outside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.