input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@acme.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@acme.bank"],"senderIP":"177.247.224.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=177.247.224.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=177.247.224.104 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Mail delivery failed: returning message to sender",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-21T20:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: subj: Mail delivery failed: returning message to sender",
"severitycode": 2,
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@acme.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@acme.bank\"],\"senderIP\":\"177.247.224.104\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=177.247.224.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=177.247.224.104 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "103.1.114.52",
"messagetype": "email_protection_event",
"filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "177.247.224.104"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@acme.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@acme.bank"],"senderIP":"177.247.224.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=177.247.224.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=177.247.224.104 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@acme.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@acme.bank"],"senderIP":"177.247.224.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=177.247.224.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=177.247.224.104 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Mail delivery failed: returning message to sender
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-21T20:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: subj: Mail delivery failed: returning message to sender
severitycode: 2
sourceinfo: unknown
sensitivity: normal
emailsendingserver: 103.1.114.52
messagetype: email_protection_event
filehash: <E1p6ORz-0003Jr-5z@server.payin.in>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 177.247.224.104 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"246.133.184.179","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=246.133.184.179 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=246.133.184.179 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Mail delivery failed: returning message to sender",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-21T20:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: subj: Mail delivery failed: returning message to sender",
"severitycode": 2,
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@stark.bank\"],\"senderIP\":\"246.133.184.179\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=246.133.184.179 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=246.133.184.179 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "103.1.114.52",
"messagetype": "email_protection_event",
"filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "246.133.184.179"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"246.133.184.179","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=246.133.184.179 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=246.133.184.179 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"246.133.184.179","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=246.133.184.179 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=246.133.184.179 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Mail delivery failed: returning message to sender
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-21T20:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: subj: Mail delivery failed: returning message to sender
severitycode: 2
sourceinfo: unknown
sensitivity: normal
emailsendingserver: 103.1.114.52
messagetype: email_protection_event
filehash: <E1p6ORz-0003Jr-5z@server.payin.in>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 246.133.184.179 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@umbrella.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@umbrella.bank"],"senderIP":"131.107.79.45","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=131.107.79.45 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=131.107.79.45 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Mail delivery failed: returning message to sender",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-21T20:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: subj: Mail delivery failed: returning message to sender",
"severitycode": 2,
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@umbrella.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@umbrella.bank\"],\"senderIP\":\"131.107.79.45\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=131.107.79.45 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=131.107.79.45 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "103.1.114.52",
"messagetype": "email_protection_event",
"filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "131.107.79.45"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@umbrella.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@umbrella.bank"],"senderIP":"131.107.79.45","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=131.107.79.45 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=131.107.79.45 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@umbrella.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@umbrella.bank"],"senderIP":"131.107.79.45","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=131.107.79.45 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=131.107.79.45 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Mail delivery failed: returning message to sender
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-21T20:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: subj: Mail delivery failed: returning message to sender
severitycode: 2
sourceinfo: unknown
sensitivity: normal
emailsendingserver: 103.1.114.52
messagetype: email_protection_event
filehash: <E1p6ORz-0003Jr-5z@server.payin.in>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 131.107.79.45 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"67.85.114.132","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=67.85.114.132 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=67.85.114.132 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Mail delivery failed: returning message to sender",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-21T20:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: subj: Mail delivery failed: returning message to sender",
"severitycode": 2,
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@oscorp.bank\"],\"senderIP\":\"67.85.114.132\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=67.85.114.132 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=67.85.114.132 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "103.1.114.52",
"messagetype": "email_protection_event",
"filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "67.85.114.132"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"67.85.114.132","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=67.85.114.132 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=67.85.114.132 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"67.85.114.132","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=67.85.114.132 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=67.85.114.132 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Mail delivery failed: returning message to sender
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-21T20:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: subj: Mail delivery failed: returning message to sender
severitycode: 2
sourceinfo: unknown
sensitivity: normal
emailsendingserver: 103.1.114.52
messagetype: email_protection_event
filehash: <E1p6ORz-0003Jr-5z@server.payin.in>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 67.85.114.132 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"47.192.82.237","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=47.192.82.237 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=47.192.82.237 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Mail delivery failed: returning message to sender",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-21T20:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: subj: Mail delivery failed: returning message to sender",
"severitycode": 2,
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@oscorp.bank\"],\"senderIP\":\"47.192.82.237\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=47.192.82.237 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=47.192.82.237 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "103.1.114.52",
"messagetype": "email_protection_event",
"filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "47.192.82.237"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"47.192.82.237","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=47.192.82.237 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=47.192.82.237 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"47.192.82.237","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=47.192.82.237 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=47.192.82.237 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Mail delivery failed: returning message to sender
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-21T20:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: subj: Mail delivery failed: returning message to sender
severitycode: 2
sourceinfo: unknown
sensitivity: normal
emailsendingserver: 103.1.114.52
messagetype: email_protection_event
filehash: <E1p6ORz-0003Jr-5z@server.payin.in>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 47.192.82.237 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"242.239.18.177","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=242.239.18.177 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=242.239.18.177 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "no-reply@unmixt.top",
"emailsendingserver": "165.154.138.39",
"emailsubject": "The sales day is the new festival. Come celebrate with us",
"filehash": "<3unvwk8rtr-1@m0162926.ppops.net>",
"filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"242.239.18.177\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=242.239.18.177 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=242.239.18.177 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T19:03:48.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "242.239.18.177"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"242.239.18.177","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=242.239.18.177 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=242.239.18.177 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"242.239.18.177","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=242.239.18.177 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=242.239.18.177 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: no-reply@unmixt.top
emailsendingserver: 165.154.138.39
emailsubject: The sales day is the new festival. Come celebrate with us
filehash: <3unvwk8rtr-1@m0162926.ppops.net>
filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T19:03:48.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 242.239.18.177 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"28.81.236.149","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=28.81.236.149 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=28.81.236.149 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "no-reply@unmixt.top",
"emailsendingserver": "165.154.138.39",
"emailsubject": "The sales day is the new festival. Come celebrate with us",
"filehash": "<3unvwk8rtr-1@m0162926.ppops.net>",
"filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"28.81.236.149\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=28.81.236.149 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=28.81.236.149 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T19:03:48.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "28.81.236.149"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"28.81.236.149","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=28.81.236.149 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=28.81.236.149 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"28.81.236.149","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=28.81.236.149 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=28.81.236.149 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: no-reply@unmixt.top
emailsendingserver: 165.154.138.39
emailsubject: The sales day is the new festival. Come celebrate with us
filehash: <3unvwk8rtr-1@m0162926.ppops.net>
filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T19:03:48.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 28.81.236.149 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"35.194.232.241","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=35.194.232.241 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=35.194.232.241 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "no-reply@unmixt.top",
"emailsendingserver": "165.154.138.39",
"emailsubject": "The sales day is the new festival. Come celebrate with us",
"filehash": "<3unvwk8rtr-1@m0162926.ppops.net>",
"filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"35.194.232.241\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=35.194.232.241 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=35.194.232.241 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T19:03:48.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "35.194.232.241"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"35.194.232.241","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=35.194.232.241 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=35.194.232.241 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"35.194.232.241","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=35.194.232.241 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=35.194.232.241 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: no-reply@unmixt.top
emailsendingserver: 165.154.138.39
emailsubject: The sales day is the new festival. Come celebrate with us
filehash: <3unvwk8rtr-1@m0162926.ppops.net>
filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T19:03:48.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 35.194.232.241 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"199.32.116.196","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=199.32.116.196 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=199.32.116.196 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "no-reply@unmixt.top",
"emailsendingserver": "165.154.138.39",
"emailsubject": "The sales day is the new festival. Come celebrate with us",
"filehash": "<3unvwk8rtr-1@m0162926.ppops.net>",
"filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"199.32.116.196\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=199.32.116.196 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=199.32.116.196 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T19:03:48.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "199.32.116.196"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"199.32.116.196","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=199.32.116.196 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=199.32.116.196 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"199.32.116.196","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=199.32.116.196 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=199.32.116.196 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: no-reply@unmixt.top
emailsendingserver: 165.154.138.39
emailsubject: The sales day is the new festival. Come celebrate with us
filehash: <3unvwk8rtr-1@m0162926.ppops.net>
filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T19:03:48.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 199.32.116.196 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"97.20.66.254","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=97.20.66.254 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=97.20.66.254 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "no-reply@unmixt.top",
"emailsendingserver": "165.154.138.39",
"emailsubject": "The sales day is the new festival. Come celebrate with us",
"filehash": "<3unvwk8rtr-1@m0162926.ppops.net>",
"filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"97.20.66.254\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=97.20.66.254 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=97.20.66.254 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T19:03:48.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "97.20.66.254"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"97.20.66.254","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=97.20.66.254 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=97.20.66.254 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"97.20.66.254","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=97.20.66.254 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=97.20.66.254 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: no-reply@unmixt.top
emailsendingserver: 165.154.138.39
emailsubject: The sales day is the new festival. Come celebrate with us
filehash: <3unvwk8rtr-1@m0162926.ppops.net>
filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T19:03:48.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 97.20.66.254 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"70.98.8.216","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=70.98.8.216 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=70.98.8.216 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "no-reply@unmixt.top",
"emailsendingserver": "165.154.138.39",
"emailsubject": "The sales day is the new festival. Come celebrate with us",
"filehash": "<3unvwk8rtr-1@m0162926.ppops.net>",
"filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"70.98.8.216\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=70.98.8.216 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=70.98.8.216 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T19:03:48.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "70.98.8.216"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"70.98.8.216","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=70.98.8.216 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=70.98.8.216 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"70.98.8.216","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=70.98.8.216 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=70.98.8.216 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: no-reply@unmixt.top
emailsendingserver: 165.154.138.39
emailsubject: The sales day is the new festival. Come celebrate with us
filehash: <3unvwk8rtr-1@m0162926.ppops.net>
filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T19:03:48.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 70.98.8.216 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"218.150.48.56","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=218.150.48.56 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=218.150.48.56 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "no-reply@unmixt.top",
"emailsendingserver": "165.154.138.39",
"emailsubject": "The sales day is the new festival. Come celebrate with us",
"filehash": "<3unvwk8rtr-1@m0162926.ppops.net>",
"filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"218.150.48.56\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=218.150.48.56 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=218.150.48.56 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T19:03:48.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "218.150.48.56"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"218.150.48.56","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=218.150.48.56 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=218.150.48.56 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"218.150.48.56","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=218.150.48.56 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=218.150.48.56 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: no-reply@unmixt.top
emailsendingserver: 165.154.138.39
emailsubject: The sales day is the new festival. Come celebrate with us
filehash: <3unvwk8rtr-1@m0162926.ppops.net>
filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T19:03:48.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 218.150.48.56 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"107.217.54.91","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=107.217.54.91 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=107.217.54.91 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "no-reply@unmixt.top",
"emailsendingserver": "165.154.138.39",
"emailsubject": "The sales day is the new festival. Come celebrate with us",
"filehash": "<3unvwk8rtr-1@m0162926.ppops.net>",
"filename": "from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919\",\"threatTime\":\"2023-11-25T07:32:26.000Z\",\"threat\":\"tinyurl.com/2cabrzmv/SubscribeClick\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T19:03:48.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"The sales day is the new festival. Come celebrate with us\",\"quarantineFolder\":null,\"quarantineRule\":null,\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"dkimv\",\"spf\",\"dmarc\",\"pdr\"],\"messageSize\":10511,\"headerFrom\":\"\\\"Louis Vuitton\\\" <no-reply@unmixt.top>\",\"headerReplyTo\":null,\"fromAddress\":[\"no-reply@unmixt.top\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"dibrahim@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792\",\"md5\":\"307b13584f26d74c0527240851f2d754\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"12bc1530-9a68-0875-817a-66b2a44f50ed\",\"QID\":\"3unvwk8rtr-1\",\"GUID\":\"blXZzat-zRXote3JApQPYNoxhMWxI5X0\",\"sender\":\"no-reply@unmixt.top\",\"recipient\":[\"dibrahim@sandiegoprivatebank.net\"],\"senderIP\":\"107.217.54.91\",\"messageID\":\"<3unvwk8rtr-1@m0162926.ppops.net>\"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=107.217.54.91 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=107.217.54.91 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T19:03:48.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "107.217.54.91"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"107.217.54.91","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=107.217.54.91 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=107.217.54.91 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/13ec7ee44c53b7541e08c76b9868f9df22ce383170b5acb96adf0af6d8ab7919","threatTime":"2023-11-25T07:32:26.000Z","threat":"tinyurl.com/2cabrzmv/SubscribeClick","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T19:03:48.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"The sales day is the new festival. Come celebrate with us","quarantineFolder":null,"quarantineRule":null,"policyRoutes":["default_inbound"],"modulesRun":["dkimv","spf","dmarc","pdr"],"messageSize":10511,"headerFrom":"\"Louis Vuitton\" <no-reply@unmixt.top>","headerReplyTo":null,"fromAddress":["no-reply@unmixt.top"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["dibrahim@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"a4f8dd50b5f7c463a3d22aa60570f699f11155999fe58d7054a24198a0376792","md5":"307b13584f26d74c0527240851f2d754","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"12bc1530-9a68-0875-817a-66b2a44f50ed","QID":"3unvwk8rtr-1","GUID":"blXZzat-zRXote3JApQPYNoxhMWxI5X0","sender":"no-reply@unmixt.top","recipient":["dibrahim@sandiegoprivatebank.net"],"senderIP":"107.217.54.91","messageID":"<3unvwk8rtr-1@m0162926.ppops.net>"} ::: fileHash=<3unvwk8rtr-1@m0162926.ppops.net> ::: fileName=from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us ::: serverIP=107.217.54.91 ::: emailFrom=no-reply@unmixt.top ::: created_at=2023-11-30T19:03:48.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=The sales day is the new festival. Come celebrate with us ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T19:03:48.000Z ::: emailSendingServer=107.217.54.91 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: no-reply@unmixt.top
emailsendingserver: 165.154.138.39
emailsubject: The sales day is the new festival. Come celebrate with us
filehash: <3unvwk8rtr-1@m0162926.ppops.net>
filename: from: no-reply@unmixt.top subj: The sales day is the new festival. Come celebrate with us
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T19:03:48.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 107.217.54.91 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"wayne.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","wayne_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"wayne.bank VoiceMail<rsujeeth@wayne.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@wayne.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@wayne.bank","recipient":["rsujeeth@wayne.bank"],"senderIP":"48.50.9.233","messageID":"<20231130183733.584B6D8B3DB3AD5E@wayne.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@wayne.bank> ::: fileName=from: rsujeeth@wayne.bank subj: wayne.bank VoiceMail Notification To rsujeeth ::: serverIP=48.50.9.233 ::: emailFrom=rsujeeth@wayne.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=wayne.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=48.50.9.233 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "rsujeeth@calprivate.bank",
"emailsendingserver": "106.75.169.6",
"emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth",
"filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>",
"filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"wayne.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"wayne_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"wayne.bank VoiceMail<rsujeeth@wayne.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@wayne.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@wayne.bank\",\"recipient\":[\"rsujeeth@wayne.bank\"],\"senderIP\":\"48.50.9.233\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@wayne.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@wayne.bank> ::: fileName=from: rsujeeth@wayne.bank subj: wayne.bank VoiceMail Notification To rsujeeth ::: serverIP=48.50.9.233 ::: emailFrom=rsujeeth@wayne.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=wayne.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=48.50.9.233 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T18:38:20.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "48.50.9.233"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"wayne.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","wayne_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"wayne.bank VoiceMail<rsujeeth@wayne.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@wayne.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@wayne.bank","recipient":["rsujeeth@wayne.bank"],"senderIP":"48.50.9.233","messageID":"<20231130183733.584B6D8B3DB3AD5E@wayne.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@wayne.bank> ::: fileName=from: rsujeeth@wayne.bank subj: wayne.bank VoiceMail Notification To rsujeeth ::: serverIP=48.50.9.233 ::: emailFrom=rsujeeth@wayne.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=wayne.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=48.50.9.233 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"wayne.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","wayne_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"wayne.bank VoiceMail<rsujeeth@wayne.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@wayne.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@wayne.bank","recipient":["rsujeeth@wayne.bank"],"senderIP":"48.50.9.233","messageID":"<20231130183733.584B6D8B3DB3AD5E@wayne.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@wayne.bank> ::: fileName=from: rsujeeth@wayne.bank subj: wayne.bank VoiceMail Notification To rsujeeth ::: serverIP=48.50.9.233 ::: emailFrom=rsujeeth@wayne.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=wayne.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=48.50.9.233 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: rsujeeth@calprivate.bank
emailsendingserver: 106.75.169.6
emailsubject: calprivate.bank VoiceMail Notification To rsujeeth
filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank>
filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T18:38:20.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 48.50.9.233 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"224.54.178.242","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=224.54.178.242 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=224.54.178.242 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "rsujeeth@calprivate.bank",
"emailsendingserver": "106.75.169.6",
"emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth",
"filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>",
"filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"umbrella.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"umbrella_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@umbrella.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@umbrella.bank\",\"recipient\":[\"rsujeeth@umbrella.bank\"],\"senderIP\":\"224.54.178.242\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=224.54.178.242 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=224.54.178.242 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T18:38:20.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "224.54.178.242"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"224.54.178.242","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=224.54.178.242 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=224.54.178.242 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"224.54.178.242","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=224.54.178.242 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=224.54.178.242 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: rsujeeth@calprivate.bank
emailsendingserver: 106.75.169.6
emailsubject: calprivate.bank VoiceMail Notification To rsujeeth
filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank>
filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T18:38:20.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 224.54.178.242 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"76.111.141.83","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=76.111.141.83 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=76.111.141.83 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "rsujeeth@calprivate.bank",
"emailsendingserver": "106.75.169.6",
"emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth",
"filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>",
"filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"oscorp.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"oscorp_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@oscorp.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@oscorp.bank\",\"recipient\":[\"rsujeeth@oscorp.bank\"],\"senderIP\":\"76.111.141.83\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=76.111.141.83 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=76.111.141.83 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T18:38:20.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "76.111.141.83"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"76.111.141.83","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=76.111.141.83 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=76.111.141.83 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"76.111.141.83","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=76.111.141.83 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=76.111.141.83 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: rsujeeth@calprivate.bank
emailsendingserver: 106.75.169.6
emailsubject: calprivate.bank VoiceMail Notification To rsujeeth
filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank>
filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T18:38:20.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 76.111.141.83 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"acme.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","acme_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"acme.bank VoiceMail<rsujeeth@acme.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@acme.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@acme.bank","recipient":["rsujeeth@acme.bank"],"senderIP":"128.56.232.251","messageID":"<20231130183733.584B6D8B3DB3AD5E@acme.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@acme.bank> ::: fileName=from: rsujeeth@acme.bank subj: acme.bank VoiceMail Notification To rsujeeth ::: serverIP=128.56.232.251 ::: emailFrom=rsujeeth@acme.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=acme.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=128.56.232.251 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "rsujeeth@calprivate.bank",
"emailsendingserver": "106.75.169.6",
"emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth",
"filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>",
"filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"acme.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"acme_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"acme.bank VoiceMail<rsujeeth@acme.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@acme.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@acme.bank\",\"recipient\":[\"rsujeeth@acme.bank\"],\"senderIP\":\"128.56.232.251\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@acme.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@acme.bank> ::: fileName=from: rsujeeth@acme.bank subj: acme.bank VoiceMail Notification To rsujeeth ::: serverIP=128.56.232.251 ::: emailFrom=rsujeeth@acme.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=acme.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=128.56.232.251 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T18:38:20.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "128.56.232.251"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"acme.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","acme_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"acme.bank VoiceMail<rsujeeth@acme.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@acme.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@acme.bank","recipient":["rsujeeth@acme.bank"],"senderIP":"128.56.232.251","messageID":"<20231130183733.584B6D8B3DB3AD5E@acme.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@acme.bank> ::: fileName=from: rsujeeth@acme.bank subj: acme.bank VoiceMail Notification To rsujeeth ::: serverIP=128.56.232.251 ::: emailFrom=rsujeeth@acme.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=acme.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=128.56.232.251 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"acme.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","acme_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"acme.bank VoiceMail<rsujeeth@acme.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@acme.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@acme.bank","recipient":["rsujeeth@acme.bank"],"senderIP":"128.56.232.251","messageID":"<20231130183733.584B6D8B3DB3AD5E@acme.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@acme.bank> ::: fileName=from: rsujeeth@acme.bank subj: acme.bank VoiceMail Notification To rsujeeth ::: serverIP=128.56.232.251 ::: emailFrom=rsujeeth@acme.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=acme.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=128.56.232.251 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: rsujeeth@calprivate.bank
emailsendingserver: 106.75.169.6
emailsubject: calprivate.bank VoiceMail Notification To rsujeeth
filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank>
filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T18:38:20.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 128.56.232.251 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"230.28.164.114","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=230.28.164.114 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=230.28.164.114 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "rsujeeth@calprivate.bank",
"emailsendingserver": "106.75.169.6",
"emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth",
"filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>",
"filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"umbrella.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"umbrella_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@umbrella.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@umbrella.bank\",\"recipient\":[\"rsujeeth@umbrella.bank\"],\"senderIP\":\"230.28.164.114\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=230.28.164.114 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=230.28.164.114 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T18:38:20.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "230.28.164.114"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"230.28.164.114","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=230.28.164.114 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=230.28.164.114 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"umbrella.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","umbrella_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"umbrella.bank VoiceMail<rsujeeth@umbrella.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@umbrella.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@umbrella.bank","recipient":["rsujeeth@umbrella.bank"],"senderIP":"230.28.164.114","messageID":"<20231130183733.584B6D8B3DB3AD5E@umbrella.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@umbrella.bank> ::: fileName=from: rsujeeth@umbrella.bank subj: umbrella.bank VoiceMail Notification To rsujeeth ::: serverIP=230.28.164.114 ::: emailFrom=rsujeeth@umbrella.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=umbrella.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=230.28.164.114 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: rsujeeth@calprivate.bank
emailsendingserver: 106.75.169.6
emailsubject: calprivate.bank VoiceMail Notification To rsujeeth
filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank>
filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T18:38:20.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 230.28.164.114 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"8.81.18.111","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=8.81.18.111 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=8.81.18.111 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "rsujeeth@calprivate.bank",
"emailsendingserver": "106.75.169.6",
"emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth",
"filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>",
"filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"oscorp.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"oscorp_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@oscorp.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@oscorp.bank\",\"recipient\":[\"rsujeeth@oscorp.bank\"],\"senderIP\":\"8.81.18.111\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=8.81.18.111 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=8.81.18.111 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T18:38:20.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "8.81.18.111"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"8.81.18.111","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=8.81.18.111 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=8.81.18.111 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"8.81.18.111","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=8.81.18.111 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=8.81.18.111 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: rsujeeth@calprivate.bank
emailsendingserver: 106.75.169.6
emailsubject: calprivate.bank VoiceMail Notification To rsujeeth
filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank>
filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T18:38:20.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 8.81.18.111 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"74.79.53.106","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=74.79.53.106 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=74.79.53.106 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "rsujeeth@calprivate.bank",
"emailsendingserver": "106.75.169.6",
"emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth",
"filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>",
"filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"oscorp.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"oscorp_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@oscorp.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@oscorp.bank\",\"recipient\":[\"rsujeeth@oscorp.bank\"],\"senderIP\":\"74.79.53.106\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=74.79.53.106 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=74.79.53.106 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T18:38:20.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "74.79.53.106"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"74.79.53.106","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=74.79.53.106 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=74.79.53.106 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"74.79.53.106","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=74.79.53.106 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=74.79.53.106 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: rsujeeth@calprivate.bank
emailsendingserver: 106.75.169.6
emailsubject: calprivate.bank VoiceMail Notification To rsujeeth
filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank>
filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T18:38:20.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 74.79.53.106 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"126.193.148.222","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=126.193.148.222 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=126.193.148.222 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "rsujeeth@calprivate.bank",
"emailsendingserver": "106.75.169.6",
"emailsubject": "calprivate.bank VoiceMail Notification To rsujeeth",
"filehash": "<20231130183733.584B6D8B3DB3AD5E@calprivate.bank>",
"filename": "from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb\",\"threatTime\":\"2023-11-30T07:41:27.000Z\",\"threat\":\"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-11-30T18:38:20.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"oscorp.bank VoiceMail Notification To rsujeeth\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"oscorp_from\",\"yanroute\"],\"modulesRun\":[\"access\",\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4726,\"headerFrom\":\"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>\",\"headerReplyTo\":null,\"fromAddress\":[\"rsujeeth@oscorp.bank\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rsujeeth@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6\",\"md5\":\"0aa8679179dd7b7a5b2618236e973c64\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"15d2e057-1e7a-4025-52e7-1f09a67173aa\",\"QID\":\"3unvwk8rc4-1\",\"GUID\":\"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-\",\"sender\":\"rsujeeth@oscorp.bank\",\"recipient\":[\"rsujeeth@oscorp.bank\"],\"senderIP\":\"126.193.148.222\",\"messageID\":\"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>\"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=126.193.148.222 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=126.193.148.222 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-11-30T18:38:20.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "126.193.148.222"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"126.193.148.222","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=126.193.148.222 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=126.193.148.222 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9e02c281448414c9d938d07e68e7b5d006c0bcf96f06485ab481b167a36c19cb","threatTime":"2023-11-30T07:41:27.000Z","threat":"cloudflare-ipfs.com/ipfs/bafkreiabbo6sj3rd6t5bpez56drw4ugp5pcycr6uxc7gdzr3s6k4hfg7gm","campaignID":null,"threatType":"url"}],"messageTime":"2023-11-30T18:38:20.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"oscorp.bank VoiceMail Notification To rsujeeth","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","oscorp_from","yanroute"],"modulesRun":["access","av","spf","spam","dmarc","pdr","urldefense"],"messageSize":4726,"headerFrom":"oscorp.bank VoiceMail<rsujeeth@oscorp.bank>","headerReplyTo":null,"fromAddress":["rsujeeth@oscorp.bank"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rsujeeth@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"141a3479887cddc02ac9b365ea4219df145ac53f09e9da98b5353fa77336d9d6","md5":"0aa8679179dd7b7a5b2618236e973c64","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"15d2e057-1e7a-4025-52e7-1f09a67173aa","QID":"3unvwk8rc4-1","GUID":"6MUhwVkx6uLlKVvoQSUaMhb5WVi83LA-","sender":"rsujeeth@oscorp.bank","recipient":["rsujeeth@oscorp.bank"],"senderIP":"126.193.148.222","messageID":"<20231130183733.584B6D8B3DB3AD5E@oscorp.bank>"} ::: fileHash=<20231130183733.584B6D8B3DB3AD5E@oscorp.bank> ::: fileName=from: rsujeeth@oscorp.bank subj: oscorp.bank VoiceMail Notification To rsujeeth ::: serverIP=126.193.148.222 ::: emailFrom=rsujeeth@oscorp.bank ::: created_at=2023-11-30T18:38:20.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=oscorp.bank VoiceMail Notification To rsujeeth ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-11-30T18:38:20.000Z ::: emailSendingServer=126.193.148.222 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: rsujeeth@calprivate.bank
emailsendingserver: 106.75.169.6
emailsubject: calprivate.bank VoiceMail Notification To rsujeeth
filehash: <20231130183733.584B6D8B3DB3AD5E@calprivate.bank>
filename: from: rsujeeth@calprivate.bank subj: calprivate.bank VoiceMail Notification To rsujeeth
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-11-30T18:38:20.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 126.193.148.222 | Explain this syslog message |
<132>Sep 16 02:24:14 shareholders drupal: https://shareholders.acme.com|1694831054|access denied|10.198.23.253|https://shareholders.acme.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Sep 16 02:24:14",
"message": "<132>Sep 16 02:24:14 shareholders drupal: https://shareholders.acme.com|1694831054|access denied|10.198.23.253|https://shareholders.acme.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1694831054",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "10.198.23.253"
} | Create a JSON artifact from the message |
<132>Sep 16 02:24:14 shareholders drupal: https://shareholders.acme.com|1694831054|access denied|10.198.23.253|https://shareholders.acme.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Sep 16 02:24:14 shareholders drupal: https://shareholders.acme.com|1694831054|access denied|10.198.23.253|https://shareholders.acme.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Sep 16 02:24:14
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1694831054
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 10.198.23.253 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t171.135.35.113\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"171.135.35.113","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | {
"action": "Logon",
"clientport": 51771,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-19T07:38:32.172Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-19T07:38:33.710Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t171.135.35.113\\n\\tSource Port:\\t\\t51771\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"171.135.35.113\",\"IpPort\":\"51771\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":5964}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6957686134,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6957686134",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "171.135.35.113",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t171.135.35.113\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"171.135.35.113","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t171.135.35.113\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"171.135.35.113","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 51771
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6957686134
streamName: microsoft-windows-security-auditing
clientIP: 171.135.35.113
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t228.226.193.47\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.226.193.47","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | {
"action": "Logon",
"clientport": 51771,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-19T07:38:32.172Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-19T07:38:33.710Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t228.226.193.47\\n\\tSource Port:\\t\\t51771\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"228.226.193.47\",\"IpPort\":\"51771\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":5964}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6957686134,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6957686134",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "228.226.193.47",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t228.226.193.47\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.226.193.47","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t228.226.193.47\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.226.193.47","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 51771
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6957686134
streamName: microsoft-windows-security-auditing
clientIP: 228.226.193.47
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t159.47.56.8\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"159.47.56.8","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | {
"action": "Logon",
"clientport": 51771,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-19T07:38:32.172Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-19T07:38:33.710Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t159.47.56.8\\n\\tSource Port:\\t\\t51771\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"159.47.56.8\",\"IpPort\":\"51771\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":5964}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6957686134,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6957686134",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "159.47.56.8",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t159.47.56.8\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"159.47.56.8","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t159.47.56.8\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"159.47.56.8","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 51771
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6957686134
streamName: microsoft-windows-security-auditing
clientIP: 159.47.56.8
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t217.151.192.22\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.151.192.22","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | {
"action": "Logon",
"clientport": 51771,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-19T07:38:32.172Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-19T07:38:33.710Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t217.151.192.22\\n\\tSource Port:\\t\\t51771\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"217.151.192.22\",\"IpPort\":\"51771\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":5964}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6957686134,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6957686134",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "217.151.192.22",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t217.151.192.22\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.151.192.22","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-19T07:38:32.172Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-19T07:38:33.710Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t217.151.192.22\n\tSource Port:\t\t51771\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.151.192.22","IpPort":"51771","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":5964}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6957686134,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 51771
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6957686134
streamName: microsoft-windows-security-auditing
clientIP: 217.151.192.22
userName: janedoe | Explain this syslog message |
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:104.136.20.160/50459 dst outside:173.42.215.27/54443 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 50459,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:104.136.20.160/50459 dst outside:173.42.215.27/54443 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54443,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "173.42.215.27",
"serverIP": "104.136.20.160"
} | Create a JSON artifact from the message |
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:104.136.20.160/50459 dst outside:173.42.215.27/54443 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:104.136.20.160/50459 dst outside:173.42.215.27/54443 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 50459
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54443
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 173.42.215.27
serverIP: 104.136.20.160 | Explain this syslog message |
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:191.9.135.153/50459 dst outside:44.96.44.112/54443 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 50459,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:191.9.135.153/50459 dst outside:44.96.44.112/54443 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54443,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "44.96.44.112",
"serverIP": "191.9.135.153"
} | Create a JSON artifact from the message |
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:191.9.135.153/50459 dst outside:44.96.44.112/54443 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 30 2023 11:25:35 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:191.9.135.153/50459 dst outside:44.96.44.112/54443 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 50459
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54443
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 44.96.44.112
serverIP: 191.9.135.153 | Explain this syslog message |
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:165.178.133.181/50460 dst outside:82.47.215.244/54443 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 50460,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:165.178.133.181/50460 dst outside:82.47.215.244/54443 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54443,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "82.47.215.244",
"serverIP": "165.178.133.181"
} | Create a JSON artifact from the message |
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:165.178.133.181/50460 dst outside:82.47.215.244/54443 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:165.178.133.181/50460 dst outside:82.47.215.244/54443 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 50460
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54443
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 82.47.215.244
serverIP: 165.178.133.181 | Explain this syslog message |
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:231.164.237.159/50460 dst outside:55.80.148.157/54443 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 50460,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:231.164.237.159/50460 dst outside:55.80.148.157/54443 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54443,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "55.80.148.157",
"serverIP": "231.164.237.159"
} | Create a JSON artifact from the message |
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:231.164.237.159/50460 dst outside:55.80.148.157/54443 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 30 2023 11:25:37 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:231.164.237.159/50460 dst outside:55.80.148.157/54443 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 50460
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54443
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 55.80.148.157
serverIP: 231.164.237.159 | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"13.153.87.126","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"bob@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"bob"}} ::: program=null ::: clientIP=13.153.87.126 ::: userName=bob ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1661867851",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "96.84.169.33",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=96.84.169.33 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"13.153.87.126\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"96.84.169.33\",\"location\":{\"city\":\"Marietta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-328-0458\"},\"email\":\"bob@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-30T13:57:31.584330+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661867851,\"txid\":\"9dd233d9-4452-472b-b507-145a58228bfa\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUB510UAMV1KPMTEP1RV\",\"name\":\"bob\"}} ::: program=null ::: clientIP=13.153.87.126 ::: userName=bob ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "13.153.87.126",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"13.153.87.126","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"bob@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"bob"}} ::: program=null ::: clientIP=13.153.87.126 ::: userName=bob ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"13.153.87.126","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"bob@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"bob"}} ::: program=null ::: clientIP=13.153.87.126 ::: userName=bob ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1661867851
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 96.84.169.33
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 13.153.87.126
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"244.176.96.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"johndoe@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"johndoe"}} ::: program=null ::: clientIP=244.176.96.214 ::: userName=johndoe ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1661867851",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "96.84.169.33",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=96.84.169.33 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"244.176.96.214\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"96.84.169.33\",\"location\":{\"city\":\"Marietta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-328-0458\"},\"email\":\"johndoe@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-30T13:57:31.584330+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661867851,\"txid\":\"9dd233d9-4452-472b-b507-145a58228bfa\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUB510UAMV1KPMTEP1RV\",\"name\":\"johndoe\"}} ::: program=null ::: clientIP=244.176.96.214 ::: userName=johndoe ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "244.176.96.214",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"244.176.96.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"johndoe@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"johndoe"}} ::: program=null ::: clientIP=244.176.96.214 ::: userName=johndoe ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.84.169.33 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"244.176.96.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.84.169.33","location":{"city":"Marietta","country":"United States","state":"Georgia"},"name":"770-328-0458"},"email":"johndoe@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:57:31.584330+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867851,"txid":"9dd233d9-4452-472b-b507-145a58228bfa","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUB510UAMV1KPMTEP1RV","name":"johndoe"}} ::: program=null ::: clientIP=244.176.96.214 ::: userName=johndoe ::: created_at=1661867851 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867851 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1661867851
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 96.84.169.33
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 244.176.96.214
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=172.56.26.123 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"111.238.244.54","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"172.56.26.123","location":{"city":"Jacksonville","country":"United States","state":"Florida"},"name":"419-860-9540"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:56:30.285397+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867790,"txid":"f9ac9449-190d-433c-a70f-cea73da71043","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4HIMU4BZM41LQ8JQGU","name":"janedoe"}} ::: program=null ::: clientIP=111.238.244.54 ::: userName=janedoe ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1661867790",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "172.56.26.123",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=172.56.26.123 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"111.238.244.54\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"172.56.26.123\",\"location\":{\"city\":\"Jacksonville\",\"country\":\"United States\",\"state\":\"Florida\"},\"name\":\"419-860-9540\"},\"email\":\"janedoe@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-30T13:56:30.285397+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661867790,\"txid\":\"f9ac9449-190d-433c-a70f-cea73da71043\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU4HIMU4BZM41LQ8JQGU\",\"name\":\"janedoe\"}} ::: program=null ::: clientIP=111.238.244.54 ::: userName=janedoe ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "111.238.244.54",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=172.56.26.123 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"111.238.244.54","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"172.56.26.123","location":{"city":"Jacksonville","country":"United States","state":"Florida"},"name":"419-860-9540"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:56:30.285397+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867790,"txid":"f9ac9449-190d-433c-a70f-cea73da71043","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4HIMU4BZM41LQ8JQGU","name":"janedoe"}} ::: program=null ::: clientIP=111.238.244.54 ::: userName=janedoe ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=172.56.26.123 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"111.238.244.54","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"172.56.26.123","location":{"city":"Jacksonville","country":"United States","state":"Florida"},"name":"419-860-9540"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:56:30.285397+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867790,"txid":"f9ac9449-190d-433c-a70f-cea73da71043","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4HIMU4BZM41LQ8JQGU","name":"janedoe"}} ::: program=null ::: clientIP=111.238.244.54 ::: userName=janedoe ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1661867790
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 172.56.26.123
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 111.238.244.54
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=172.56.26.123 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"17.111.115.74","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"172.56.26.123","location":{"city":"Jacksonville","country":"United States","state":"Florida"},"name":"419-860-9540"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-30T13:56:30.285397+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661867790,"txid":"f9ac9449-190d-433c-a70f-cea73da71043","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4HIMU4BZM41LQ8JQGU","name":"charlie"}} ::: program=null ::: clientIP=17.111.115.74 ::: userName=charlie ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1661867790",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "172.56.26.123",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=172.56.26.123 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"17.111.115.74\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"172.56.26.123\",\"location\":{\"city\":\"Jacksonville\",\"country\":\"United States\",\"state\":\"Florida\"},\"name\":\"419-860-9540\"},\"email\":\"charlie@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-30T13:56:30.285397+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661867790,\"txid\":\"f9ac9449-190d-433c-a70f-cea73da71043\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU4HIMU4BZM41LQ8JQGU\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=17.111.115.74 ::: userName=charlie ::: created_at=1661867790 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661867790 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "17.111.115.74",
"userName": "charlie"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.