input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@acme.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@acme.bank"],"senderIP":"177.247.224.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=177.247.224.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=177.247.224.104 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Mail delivery failed: returning message to sender", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-21T20:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: subj: Mail delivery failed: returning message to sender", "severitycode": 2, "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@acme.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@acme.bank\"],\"senderIP\":\"177.247.224.104\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=177.247.224.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=177.247.224.104 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "103.1.114.52", "messagetype": "email_protection_event", "filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "177.247.224.104" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@acme.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@acme.bank"],"senderIP":"177.247.224.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=177.247.224.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=177.247.224.104 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@acme.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@acme.bank"],"senderIP":"177.247.224.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=177.247.224.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=177.247.224.104 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Mail delivery failed: returning message to sender senderhost: localhost severitylabel: critical starttimeutc: 2022-12-21T20:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: subj: Mail delivery failed: returning message to sender severitycode: 2 sourceinfo: unknown sensitivity: normal emailsendingserver: 103.1.114.52 messagetype: email_protection_event filehash: <E1p6ORz-0003Jr-5z@server.payin.in> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 177.247.224.104
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"246.133.184.179","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=246.133.184.179 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=246.133.184.179 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Mail delivery failed: returning message to sender", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-21T20:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: subj: Mail delivery failed: returning message to sender", "severitycode": 2, "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@stark.bank\"],\"senderIP\":\"246.133.184.179\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=246.133.184.179 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=246.133.184.179 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "103.1.114.52", "messagetype": "email_protection_event", "filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "246.133.184.179" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"246.133.184.179","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=246.133.184.179 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=246.133.184.179 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"246.133.184.179","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=246.133.184.179 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=246.133.184.179 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Mail delivery failed: returning message to sender senderhost: localhost severitylabel: critical starttimeutc: 2022-12-21T20:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: subj: Mail delivery failed: returning message to sender severitycode: 2 sourceinfo: unknown sensitivity: normal emailsendingserver: 103.1.114.52 messagetype: email_protection_event filehash: <E1p6ORz-0003Jr-5z@server.payin.in> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 246.133.184.179
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@umbrella.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@umbrella.bank"],"senderIP":"131.107.79.45","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=131.107.79.45 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=131.107.79.45 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Mail delivery failed: returning message to sender", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-21T20:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: subj: Mail delivery failed: returning message to sender", "severitycode": 2, "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@umbrella.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@umbrella.bank\"],\"senderIP\":\"131.107.79.45\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=131.107.79.45 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=131.107.79.45 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "103.1.114.52", "messagetype": "email_protection_event", "filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "131.107.79.45" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@umbrella.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@umbrella.bank"],"senderIP":"131.107.79.45","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=131.107.79.45 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=131.107.79.45 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@umbrella.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@umbrella.bank"],"senderIP":"131.107.79.45","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=131.107.79.45 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=131.107.79.45 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Mail delivery failed: returning message to sender senderhost: localhost severitylabel: critical starttimeutc: 2022-12-21T20:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: subj: Mail delivery failed: returning message to sender severitycode: 2 sourceinfo: unknown sensitivity: normal emailsendingserver: 103.1.114.52 messagetype: email_protection_event filehash: <E1p6ORz-0003Jr-5z@server.payin.in> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 131.107.79.45
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"67.85.114.132","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=67.85.114.132 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=67.85.114.132 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Mail delivery failed: returning message to sender", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-21T20:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: subj: Mail delivery failed: returning message to sender", "severitycode": 2, "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@oscorp.bank\"],\"senderIP\":\"67.85.114.132\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=67.85.114.132 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=67.85.114.132 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "103.1.114.52", "messagetype": "email_protection_event", "filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "67.85.114.132" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"67.85.114.132","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=67.85.114.132 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=67.85.114.132 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"67.85.114.132","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=67.85.114.132 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=67.85.114.132 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Mail delivery failed: returning message to sender senderhost: localhost severitylabel: critical starttimeutc: 2022-12-21T20:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: subj: Mail delivery failed: returning message to sender severitycode: 2 sourceinfo: unknown sensitivity: normal emailsendingserver: 103.1.114.52 messagetype: email_protection_event filehash: <E1p6ORz-0003Jr-5z@server.payin.in> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 67.85.114.132
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"47.192.82.237","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=47.192.82.237 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=47.192.82.237 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Mail delivery failed: returning message to sender", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-21T20:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: subj: Mail delivery failed: returning message to sender", "severitycode": 2, "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@oscorp.bank\"],\"senderIP\":\"47.192.82.237\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=47.192.82.237 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=47.192.82.237 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "103.1.114.52", "messagetype": "email_protection_event", "filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "47.192.82.237" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"47.192.82.237","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=47.192.82.237 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=47.192.82.237 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"47.192.82.237","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=47.192.82.237 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=47.192.82.237 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Mail delivery failed: returning message to sender senderhost: localhost severitylabel: critical starttimeutc: 2022-12-21T20:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: subj: Mail delivery failed: returning message to sender severitycode: 2 sourceinfo: unknown sensitivity: normal emailsendingserver: 103.1.114.52 messagetype: email_protection_event filehash: <E1p6ORz-0003Jr-5z@server.payin.in> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 47.192.82.237
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"242.239.18.177","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=242.239.18.177 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=242.239.18.177 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "no-reply@unmixt.top", "emailsendingserver": "165.154.138.39", "emailsubject": "The sales day is the new festival. Come celebrate with us", "filehash": "<3unvwk8rtr-1@m0162926.ppops.net>", "filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"242.239.18.177\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=242.239.18.177 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=242.239.18.177 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T19:03:48.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "242.239.18.177" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"242.239.18.177","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=242.239.18.177 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=242.239.18.177 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"242.239.18.177","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=242.239.18.177 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=242.239.18.177 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: no-reply@unmixt.top emailsendingserver: 165.154.138.39 emailsubject: The sales day is the new festival. Come celebrate with us filehash: <3unvwk8rtr-1@m0162926.ppops.net> filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T19:03:48.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 242.239.18.177
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"28.81.236.149","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=28.81.236.149 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=28.81.236.149 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "no-reply@unmixt.top", "emailsendingserver": "165.154.138.39", "emailsubject": "The sales day is the new festival. Come celebrate with us", "filehash": "<3unvwk8rtr-1@m0162926.ppops.net>", "filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"28.81.236.149\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=28.81.236.149 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=28.81.236.149 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T19:03:48.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "28.81.236.149" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"28.81.236.149","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=28.81.236.149 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=28.81.236.149 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"28.81.236.149","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=28.81.236.149 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=28.81.236.149 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: no-reply@unmixt.top emailsendingserver: 165.154.138.39 emailsubject: The sales day is the new festival. Come celebrate with us filehash: <3unvwk8rtr-1@m0162926.ppops.net> filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T19:03:48.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 28.81.236.149
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"35.194.232.241","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=35.194.232.241 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=35.194.232.241 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "no-reply@unmixt.top", "emailsendingserver": "165.154.138.39", "emailsubject": "The sales day is the new festival. Come celebrate with us", "filehash": "<3unvwk8rtr-1@m0162926.ppops.net>", "filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"35.194.232.241\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=35.194.232.241 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=35.194.232.241 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T19:03:48.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "35.194.232.241" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"35.194.232.241","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=35.194.232.241 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=35.194.232.241 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"35.194.232.241","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=35.194.232.241 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=35.194.232.241 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: no-reply@unmixt.top emailsendingserver: 165.154.138.39 emailsubject: The sales day is the new festival. Come celebrate with us filehash: <3unvwk8rtr-1@m0162926.ppops.net> filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T19:03:48.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 35.194.232.241
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"199.32.116.196","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=199.32.116.196 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=199.32.116.196 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "no-reply@unmixt.top", "emailsendingserver": "165.154.138.39", "emailsubject": "The sales day is the new festival. Come celebrate with us", "filehash": "<3unvwk8rtr-1@m0162926.ppops.net>", "filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"199.32.116.196\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=199.32.116.196 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=199.32.116.196 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T19:03:48.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "199.32.116.196" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"199.32.116.196","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=199.32.116.196 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=199.32.116.196 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"199.32.116.196","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=199.32.116.196 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=199.32.116.196 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: no-reply@unmixt.top emailsendingserver: 165.154.138.39 emailsubject: The sales day is the new festival. Come celebrate with us filehash: <3unvwk8rtr-1@m0162926.ppops.net> filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T19:03:48.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 199.32.116.196
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"97.20.66.254","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=97.20.66.254 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=97.20.66.254 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "no-reply@unmixt.top", "emailsendingserver": "165.154.138.39", "emailsubject": "The sales day is the new festival. Come celebrate with us", "filehash": "<3unvwk8rtr-1@m0162926.ppops.net>", "filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"97.20.66.254\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=97.20.66.254 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=97.20.66.254 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T19:03:48.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "97.20.66.254" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"97.20.66.254","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=97.20.66.254 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=97.20.66.254 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"97.20.66.254","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=97.20.66.254 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=97.20.66.254 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: no-reply@unmixt.top emailsendingserver: 165.154.138.39 emailsubject: The sales day is the new festival. Come celebrate with us filehash: <3unvwk8rtr-1@m0162926.ppops.net> filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T19:03:48.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 97.20.66.254
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"70.98.8.216","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=70.98.8.216 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=70.98.8.216 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "no-reply@unmixt.top", "emailsendingserver": "165.154.138.39", "emailsubject": "The sales day is the new festival. Come celebrate with us", "filehash": "<3unvwk8rtr-1@m0162926.ppops.net>", "filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"70.98.8.216\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=70.98.8.216 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=70.98.8.216 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T19:03:48.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "70.98.8.216" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"70.98.8.216","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=70.98.8.216 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=70.98.8.216 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"70.98.8.216","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=70.98.8.216 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=70.98.8.216 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: no-reply@unmixt.top emailsendingserver: 165.154.138.39 emailsubject: The sales day is the new festival. Come celebrate with us filehash: <3unvwk8rtr-1@m0162926.ppops.net> filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T19:03:48.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 70.98.8.216
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"218.150.48.56","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=218.150.48.56 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=218.150.48.56 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "no-reply@unmixt.top", "emailsendingserver": "165.154.138.39", "emailsubject": "The sales day is the new festival. Come celebrate with us", "filehash": "<3unvwk8rtr-1@m0162926.ppops.net>", "filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"218.150.48.56\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=218.150.48.56 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=218.150.48.56 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T19:03:48.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "218.150.48.56" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"218.150.48.56","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=218.150.48.56 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=218.150.48.56 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"218.150.48.56","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=218.150.48.56 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=218.150.48.56 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: no-reply@unmixt.top emailsendingserver: 165.154.138.39 emailsubject: The sales day is the new festival. Come celebrate with us filehash: <3unvwk8rtr-1@m0162926.ppops.net> filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T19:03:48.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 218.150.48.56
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"107.217.54.91","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=107.217.54.91 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=107.217.54.91 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "no-reply@unmixt.top", "emailsendingserver": "165.154.138.39", "emailsubject": "The sales day is the new festival. Come celebrate with us", "filehash": "<3unvwk8rtr-1@m0162926.ppops.net>", "filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"107.217.54.91\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=107.217.54.91 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=107.217.54.91 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T19:03:48.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "107.217.54.91" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"107.217.54.91","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=107.217.54.91 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=107.217.54.91 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"107.217.54.91","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=107.217.54.91 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=107.217.54.91 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: no-reply@unmixt.top emailsendingserver: 165.154.138.39 emailsubject: The sales day is the new festival. Come celebrate with us filehash: <3unvwk8rtr-1@m0162926.ppops.net> filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T19:03:48.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 107.217.54.91
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"wayne.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","wayne_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"wayne.bank VoiceMail<rsujeeth@wayne.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@wayne.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@wayne.bank","recipient":["rsujeeth@wayne.bank"],"senderIP":"48.50.9.233","messageID":"<20231130183733.584B6D8B3DB3AD5E@wayne.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@wayne.bank> ::: fileName=from: rsujeeth@wayne.bank subj: wayne.bank VoiceMail Notification To rsujeeth ::: serverIP=48.50.9.233 ::: emailFrom=rsujeeth@wayne.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=wayne.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=48.50.9.233 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "rsujeeth@calprivate.bank", "emailsendingserver": "106.75.169.6", "emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth", "filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>", "filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"wayne.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"wayne_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"wayne.bank VoiceMail<rsujeeth@wayne.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@wayne.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@wayne.bank\",\"recipient\":[\"rsujeeth@wayne.bank\"],\"senderIP\":\"48.50.9.233\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@wayne.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@wayne.bank> ::: fileName=from: rsujeeth@wayne.bank subj: wayne.bank VoiceMail Notification To rsujeeth ::: serverIP=48.50.9.233 ::: emailFrom=rsujeeth@wayne.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=wayne.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=48.50.9.233 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T18:38:20.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "48.50.9.233" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"wayne.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","wayne_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"wayne.bank VoiceMail<rsujeeth@wayne.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@wayne.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@wayne.bank","recipient":["rsujeeth@wayne.bank"],"senderIP":"48.50.9.233","messageID":"<20231130183733.584B6D8B3DB3AD5E@wayne.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@wayne.bank> ::: fileName=from: rsujeeth@wayne.bank subj: wayne.bank VoiceMail Notification To rsujeeth ::: serverIP=48.50.9.233 ::: emailFrom=rsujeeth@wayne.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=wayne.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=48.50.9.233 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"wayne.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","wayne_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"wayne.bank VoiceMail<rsujeeth@wayne.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@wayne.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@wayne.bank","recipient":["rsujeeth@wayne.bank"],"senderIP":"48.50.9.233","messageID":"<20231130183733.584B6D8B3DB3AD5E@wayne.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@wayne.bank> ::: fileName=from: rsujeeth@wayne.bank subj: wayne.bank VoiceMail Notification To rsujeeth ::: serverIP=48.50.9.233 ::: emailFrom=rsujeeth@wayne.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=wayne.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=48.50.9.233 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: rsujeeth@calprivate.bank emailsendingserver: 106.75.169.6 emailsubject: calprivate.bank VoiceMail Notification To rsujeeth filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank> filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T18:38:20.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 48.50.9.233
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"224.54.178.242","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=224.54.178.242 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=224.54.178.242 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "rsujeeth@calprivate.bank", "emailsendingserver": "106.75.169.6", "emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth", "filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>", "filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"umbrella.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"umbrella_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@umbrella.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@umbrella.bank\",\"recipient\":[\"rsujeeth@umbrella.bank\"],\"senderIP\":\"224.54.178.242\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=224.54.178.242 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=224.54.178.242 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T18:38:20.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "224.54.178.242" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"224.54.178.242","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=224.54.178.242 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=224.54.178.242 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"224.54.178.242","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=224.54.178.242 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=224.54.178.242 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: rsujeeth@calprivate.bank emailsendingserver: 106.75.169.6 emailsubject: calprivate.bank VoiceMail Notification To rsujeeth filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank> filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T18:38:20.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 224.54.178.242
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"76.111.141.83","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=76.111.141.83 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=76.111.141.83 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "rsujeeth@calprivate.bank", "emailsendingserver": "106.75.169.6", "emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth", "filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>", "filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"oscorp.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"oscorp_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@oscorp.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@oscorp.bank\",\"recipient\":[\"rsujeeth@oscorp.bank\"],\"senderIP\":\"76.111.141.83\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=76.111.141.83 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=76.111.141.83 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T18:38:20.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "76.111.141.83" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"76.111.141.83","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=76.111.141.83 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=76.111.141.83 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"76.111.141.83","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=76.111.141.83 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=76.111.141.83 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: rsujeeth@calprivate.bank emailsendingserver: 106.75.169.6 emailsubject: calprivate.bank VoiceMail Notification To rsujeeth filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank> filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T18:38:20.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 76.111.141.83
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"acme.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","acme_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"acme.bank VoiceMail<rsujeeth@acme.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@acme.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@acme.bank","recipient":["rsujeeth@acme.bank"],"senderIP":"128.56.232.251","messageID":"<20231130183733.584B6D8B3DB3AD5E@acme.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@acme.bank> ::: fileName=from: rsujeeth@acme.bank subj: acme.bank VoiceMail Notification To rsujeeth ::: serverIP=128.56.232.251 ::: emailFrom=rsujeeth@acme.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=acme.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=128.56.232.251 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "rsujeeth@calprivate.bank", "emailsendingserver": "106.75.169.6", "emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth", "filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>", "filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"acme.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"acme_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"acme.bank VoiceMail<rsujeeth@acme.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@acme.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@acme.bank\",\"recipient\":[\"rsujeeth@acme.bank\"],\"senderIP\":\"128.56.232.251\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@acme.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@acme.bank> ::: fileName=from: rsujeeth@acme.bank subj: acme.bank VoiceMail Notification To rsujeeth ::: serverIP=128.56.232.251 ::: emailFrom=rsujeeth@acme.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=acme.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=128.56.232.251 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T18:38:20.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "128.56.232.251" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"acme.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","acme_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"acme.bank VoiceMail<rsujeeth@acme.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@acme.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@acme.bank","recipient":["rsujeeth@acme.bank"],"senderIP":"128.56.232.251","messageID":"<20231130183733.584B6D8B3DB3AD5E@acme.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@acme.bank> ::: fileName=from: rsujeeth@acme.bank subj: acme.bank VoiceMail Notification To rsujeeth ::: serverIP=128.56.232.251 ::: emailFrom=rsujeeth@acme.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=acme.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=128.56.232.251 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"acme.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","acme_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"acme.bank VoiceMail<rsujeeth@acme.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@acme.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@acme.bank","recipient":["rsujeeth@acme.bank"],"senderIP":"128.56.232.251","messageID":"<20231130183733.584B6D8B3DB3AD5E@acme.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@acme.bank> ::: fileName=from: rsujeeth@acme.bank subj: acme.bank VoiceMail Notification To rsujeeth ::: serverIP=128.56.232.251 ::: emailFrom=rsujeeth@acme.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=acme.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=128.56.232.251 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: rsujeeth@calprivate.bank emailsendingserver: 106.75.169.6 emailsubject: calprivate.bank VoiceMail Notification To rsujeeth filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank> filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T18:38:20.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 128.56.232.251
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"230.28.164.114","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=230.28.164.114 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=230.28.164.114 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "rsujeeth@calprivate.bank", "emailsendingserver": "106.75.169.6", "emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth", "filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>", "filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"umbrella.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"umbrella_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@umbrella.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@umbrella.bank\",\"recipient\":[\"rsujeeth@umbrella.bank\"],\"senderIP\":\"230.28.164.114\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=230.28.164.114 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=230.28.164.114 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T18:38:20.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "230.28.164.114" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"230.28.164.114","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=230.28.164.114 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=230.28.164.114 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"230.28.164.114","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=230.28.164.114 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=230.28.164.114 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: rsujeeth@calprivate.bank emailsendingserver: 106.75.169.6 emailsubject: calprivate.bank VoiceMail Notification To rsujeeth filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank> filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T18:38:20.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 230.28.164.114
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"8.81.18.111","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=8.81.18.111 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=8.81.18.111 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "rsujeeth@calprivate.bank", "emailsendingserver": "106.75.169.6", "emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth", "filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>", "filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"oscorp.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"oscorp_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@oscorp.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@oscorp.bank\",\"recipient\":[\"rsujeeth@oscorp.bank\"],\"senderIP\":\"8.81.18.111\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=8.81.18.111 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=8.81.18.111 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T18:38:20.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "8.81.18.111" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"8.81.18.111","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=8.81.18.111 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=8.81.18.111 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"8.81.18.111","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=8.81.18.111 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=8.81.18.111 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: rsujeeth@calprivate.bank emailsendingserver: 106.75.169.6 emailsubject: calprivate.bank VoiceMail Notification To rsujeeth filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank> filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T18:38:20.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 8.81.18.111
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"74.79.53.106","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=74.79.53.106 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=74.79.53.106 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "rsujeeth@calprivate.bank", "emailsendingserver": "106.75.169.6", "emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth", "filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>", "filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"oscorp.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"oscorp_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@oscorp.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@oscorp.bank\",\"recipient\":[\"rsujeeth@oscorp.bank\"],\"senderIP\":\"74.79.53.106\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=74.79.53.106 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=74.79.53.106 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T18:38:20.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "74.79.53.106" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"74.79.53.106","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=74.79.53.106 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=74.79.53.106 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"74.79.53.106","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=74.79.53.106 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=74.79.53.106 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: rsujeeth@calprivate.bank emailsendingserver: 106.75.169.6 emailsubject: calprivate.bank VoiceMail Notification To rsujeeth filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank> filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T18:38:20.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 74.79.53.106
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"126.193.148.222","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=126.193.148.222 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=126.193.148.222 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "rsujeeth@calprivate.bank", "emailsendingserver": "106.75.169.6", "emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth", "filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>", "filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"oscorp.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"oscorp_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@oscorp.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@oscorp.bank\",\"recipient\":[\"rsujeeth@oscorp.bank\"],\"senderIP\":\"126.193.148.222\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=126.193.148.222 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=126.193.148.222 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-11-30T18:38:20.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "126.193.148.222" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"126.193.148.222","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=126.193.148.222 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=126.193.148.222 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"126.193.148.222","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=126.193.148.222 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=126.193.148.222 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: rsujeeth@calprivate.bank emailsendingserver: 106.75.169.6 emailsubject: calprivate.bank VoiceMail Notification To rsujeeth filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank> filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-11-30T18:38:20.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 126.193.148.222
Explain this syslog message
<132>Sep 16 02:24:14 shareholders drupal: https://shareholders.acme.com|1694831054|access denied|10.198.23.253|https://shareholders.acme.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Sep 16 02:24:14", "message": "<132>Sep 16 02:24:14 shareholders drupal: https://shareholders.acme.com|1694831054|access denied|10.198.23.253|https://shareholders.acme.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1694831054", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "10.198.23.253" }
Create a JSON artifact from the message
<132>Sep 16 02:24:14 shareholders drupal: https://shareholders.acme.com|1694831054|access denied|10.198.23.253|https://shareholders.acme.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Sep 16 02:24:14 shareholders drupal: https://shareholders.acme.com|1694831054|access denied|10.198.23.253|https://shareholders.acme.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Sep 16 02:24:14 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1694831054 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 10.198.23.253
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t171.135.35.113\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"171.135.35.113","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
{ "action": "Logon", "clientport": 51771, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-19T07:38:32.172Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-19T07:38:33.710Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t171.135.35.113\\n\\tSource Port:\\t\\t51771\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"171.135.35.113\",\"IpPort\":\"51771\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":5964}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6957686134,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6957686134", "streamName": "microsoft-windows-security-auditing", "clientIP": "171.135.35.113", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t171.135.35.113\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"171.135.35.113","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t171.135.35.113\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"171.135.35.113","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 51771 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6957686134 streamName: microsoft-windows-security-auditing clientIP: 171.135.35.113 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t228.226.193.47\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.226.193.47","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
{ "action": "Logon", "clientport": 51771, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-19T07:38:32.172Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-19T07:38:33.710Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t228.226.193.47\\n\\tSource Port:\\t\\t51771\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"228.226.193.47\",\"IpPort\":\"51771\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":5964}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6957686134,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6957686134", "streamName": "microsoft-windows-security-auditing", "clientIP": "228.226.193.47", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t228.226.193.47\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.226.193.47","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t228.226.193.47\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.226.193.47","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 51771 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6957686134 streamName: microsoft-windows-security-auditing clientIP: 228.226.193.47 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t159.47.56.8\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"159.47.56.8","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
{ "action": "Logon", "clientport": 51771, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-19T07:38:32.172Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-19T07:38:33.710Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t159.47.56.8\\n\\tSource Port:\\t\\t51771\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"159.47.56.8\",\"IpPort\":\"51771\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":5964}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6957686134,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6957686134", "streamName": "microsoft-windows-security-auditing", "clientIP": "159.47.56.8", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t159.47.56.8\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"159.47.56.8","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t159.47.56.8\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"159.47.56.8","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 51771 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6957686134 streamName: microsoft-windows-security-auditing clientIP: 159.47.56.8 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t217.151.192.22\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.151.192.22","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
{ "action": "Logon", "clientport": 51771, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-19T07:38:32.172Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-19T07:38:33.710Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t217.151.192.22\\n\\tSource Port:\\t\\t51771\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"217.151.192.22\",\"IpPort\":\"51771\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":5964}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6957686134,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6957686134", "streamName": "microsoft-windows-security-auditing", "clientIP": "217.151.192.22", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t217.151.192.22\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.151.192.22","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t217.151.192.22\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.151.192.22","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 51771 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6957686134 streamName: microsoft-windows-security-auditing clientIP: 217.151.192.22 userName: janedoe
Explain this syslog message
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:104.136.20.160/50459 dst outside:173.42.215.27/54443 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 50459, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:104.136.20.160/50459 dst outside:173.42.215.27/54443 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 54443, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "173.42.215.27", "serverIP": "104.136.20.160" }
Create a JSON artifact from the message
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:104.136.20.160/50459 dst outside:173.42.215.27/54443 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:104.136.20.160/50459 dst outside:173.42.215.27/54443 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 50459 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 54443 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 173.42.215.27 serverIP: 104.136.20.160
Explain this syslog message
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:191.9.135.153/50459 dst outside:44.96.44.112/54443 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 50459, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:191.9.135.153/50459 dst outside:44.96.44.112/54443 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 54443, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "44.96.44.112", "serverIP": "191.9.135.153" }
Create a JSON artifact from the message
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:191.9.135.153/50459 dst outside:44.96.44.112/54443 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:191.9.135.153/50459 dst outside:44.96.44.112/54443 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 50459 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 54443 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 44.96.44.112 serverIP: 191.9.135.153
Explain this syslog message
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:165.178.133.181/50460 dst outside:82.47.215.244/54443 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 50460, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:165.178.133.181/50460 dst outside:82.47.215.244/54443 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 54443, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "82.47.215.244", "serverIP": "165.178.133.181" }
Create a JSON artifact from the message
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:165.178.133.181/50460 dst outside:82.47.215.244/54443 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:165.178.133.181/50460 dst outside:82.47.215.244/54443 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 50460 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 54443 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 82.47.215.244 serverIP: 165.178.133.181
Explain this syslog message
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:231.164.237.159/50460 dst outside:55.80.148.157/54443 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 50460, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:231.164.237.159/50460 dst outside:55.80.148.157/54443 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 54443, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "55.80.148.157", "serverIP": "231.164.237.159" }
Create a JSON artifact from the message
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:231.164.237.159/50460 dst outside:55.80.148.157/54443 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:231.164.237.159/50460 dst outside:55.80.148.157/54443 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 50460 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 54443 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 55.80.148.157 serverIP: 231.164.237.159
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"13.153.87.126","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"bob@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"bob"}} ::: program=null ::: clientIP=13.153.87.126 ::: userName=bob ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1661867851", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "96.84.169.33", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=96.84.169.33 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"13.153.87.126\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"96.84.169.33\",\"location\":{\"city\":\"Marietta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-328-0458\"},\"email\":\"bob@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-30T13:57:31.584330+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661867851,\"txid\":\"9dd233d9-4452-472b-b507-145a58228bfa\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUB510UAMV1KPMTEP1RV\",\"name\":\"bob\"}} ::: program=null ::: clientIP=13.153.87.126 ::: userName=bob ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "13.153.87.126", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"13.153.87.126","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"bob@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"bob"}} ::: program=null ::: clientIP=13.153.87.126 ::: userName=bob ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"13.153.87.126","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"bob@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"bob"}} ::: program=null ::: clientIP=13.153.87.126 ::: userName=bob ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1661867851 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 96.84.169.33 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 13.153.87.126 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"244.176.96.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"johndoe@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"johndoe"}} ::: program=null ::: clientIP=244.176.96.214 ::: userName=johndoe ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1661867851", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "96.84.169.33", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=96.84.169.33 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"244.176.96.214\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"96.84.169.33\",\"location\":{\"city\":\"Marietta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-328-0458\"},\"email\":\"johndoe@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-30T13:57:31.584330+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661867851,\"txid\":\"9dd233d9-4452-472b-b507-145a58228bfa\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUB510UAMV1KPMTEP1RV\",\"name\":\"johndoe\"}} ::: program=null ::: clientIP=244.176.96.214 ::: userName=johndoe ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "244.176.96.214", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"244.176.96.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"johndoe@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"johndoe"}} ::: program=null ::: clientIP=244.176.96.214 ::: userName=johndoe ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"244.176.96.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"johndoe@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"johndoe"}} ::: program=null ::: clientIP=244.176.96.214 ::: userName=johndoe ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1661867851 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 96.84.169.33 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 244.176.96.214 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=172.56.26.123 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"111.238.244.54","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"172.56.26.123","location":{"city":"Jacksonville","country":"United States","state":"Florida"},"name":"419-860-9540"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:56:30.285397+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867790,"txid":"f9ac9449-190d-433c-a70f-cea73da71043","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4HIMU4BZM41LQ8JQGU","name":"janedoe"}} ::: program=null ::: clientIP=111.238.244.54 ::: userName=janedoe ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1661867790", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "172.56.26.123", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=172.56.26.123 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"111.238.244.54\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"172.56.26.123\",\"location\":{\"city\":\"Jacksonville\",\"country\":\"United States\",\"state\":\"Florida\"},\"name\":\"419-860-9540\"},\"email\":\"janedoe@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-30T13:56:30.285397+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661867790,\"txid\":\"f9ac9449-190d-433c-a70f-cea73da71043\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU4HIMU4BZM41LQ8JQGU\",\"name\":\"janedoe\"}} ::: program=null ::: clientIP=111.238.244.54 ::: userName=janedoe ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "111.238.244.54", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=172.56.26.123 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"111.238.244.54","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"172.56.26.123","location":{"city":"Jacksonville","country":"United States","state":"Florida"},"name":"419-860-9540"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:56:30.285397+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867790,"txid":"f9ac9449-190d-433c-a70f-cea73da71043","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4HIMU4BZM41LQ8JQGU","name":"janedoe"}} ::: program=null ::: clientIP=111.238.244.54 ::: userName=janedoe ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=172.56.26.123 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"111.238.244.54","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"172.56.26.123","location":{"city":"Jacksonville","country":"United States","state":"Florida"},"name":"419-860-9540"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:56:30.285397+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867790,"txid":"f9ac9449-190d-433c-a70f-cea73da71043","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4HIMU4BZM41LQ8JQGU","name":"janedoe"}} ::: program=null ::: clientIP=111.238.244.54 ::: userName=janedoe ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1661867790 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 172.56.26.123 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 111.238.244.54 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=172.56.26.123 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"17.111.115.74","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"172.56.26.123","location":{"city":"Jacksonville","country":"United States","state":"Florida"},"name":"419-860-9540"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:56:30.285397+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867790,"txid":"f9ac9449-190d-433c-a70f-cea73da71043","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4HIMU4BZM41LQ8JQGU","name":"charlie"}} ::: program=null ::: clientIP=17.111.115.74 ::: userName=charlie ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1661867790", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "172.56.26.123", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=172.56.26.123 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"17.111.115.74\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"172.56.26.123\",\"location\":{\"city\":\"Jacksonville\",\"country\":\"United States\",\"state\":\"Florida\"},\"name\":\"419-860-9540\"},\"email\":\"charlie@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-30T13:56:30.285397+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661867790,\"txid\":\"f9ac9449-190d-433c-a70f-cea73da71043\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU4HIMU4BZM41LQ8JQGU\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=17.111.115.74 ::: userName=charlie ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "17.111.115.74", "userName": "charlie" }
Create a JSON artifact from the message