input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Nov 27 10:54:34 DC1-PA3220-1 1,2023/11/27 10:54:34,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:34,23.114.237.160,201.54.84.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:34,0,1,54457,35773,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:54:30,0,any,,7299323810500271443,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:34.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:54:34 DC1-PA3220-1 1,2023/11/27 10:54:34,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:34,23.114.237.160,201.54.84.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:34,0,1,54457,35773,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:54:30,0,any,,7299323810500271443,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:34.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54457
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:54:34
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 35773
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 23.114.237.160
serverIP: 201.54.84.76
|
Explain this syslog message
|
<14>Nov 27 10:54:34 DC1-PA3220-1 1,2023/11/27 10:54:34,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:34,235.0.20.150,179.170.207.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:34,0,1,54457,35773,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:54:30,0,any,,7299323810500271443,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:34.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54457,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:54:34",
"message": "<14>Nov 27 10:54:34 DC1-PA3220-1 1,2023/11/27 10:54:34,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:34,235.0.20.150,179.170.207.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:34,0,1,54457,35773,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:54:30,0,any,,7299323810500271443,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:34.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 35773,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "235.0.20.150",
"serverIP": "179.170.207.180"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:54:34 DC1-PA3220-1 1,2023/11/27 10:54:34,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:34,235.0.20.150,179.170.207.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:34,0,1,54457,35773,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:54:30,0,any,,7299323810500271443,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:34.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:54:34 DC1-PA3220-1 1,2023/11/27 10:54:34,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:34,235.0.20.150,179.170.207.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:34,0,1,54457,35773,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:54:30,0,any,,7299323810500271443,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:34.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54457
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:54:34
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 35773
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 235.0.20.150
serverIP: 179.170.207.180
|
Explain this syslog message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,172.174.51.229,201.165.97.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 50929,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 07:57:39",
"message": "<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,172.174.51.229,201.165.97.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3552,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "172.174.51.229",
"serverIP": "201.165.97.119"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,172.174.51.229,201.165.97.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,172.174.51.229,201.165.97.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 50929
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 07:57:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3552
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 172.174.51.229
serverIP: 201.165.97.119
|
Explain this syslog message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,92.136.52.98,82.65.148.157,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 50929,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 07:57:39",
"message": "<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,92.136.52.98,82.65.148.157,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3552,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "92.136.52.98",
"serverIP": "82.65.148.157"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,92.136.52.98,82.65.148.157,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,92.136.52.98,82.65.148.157,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 50929
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 07:57:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3552
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 92.136.52.98
serverIP: 82.65.148.157
|
Explain this syslog message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,107.99.105.203,246.21.138.232,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 50929,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 07:57:39",
"message": "<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,107.99.105.203,246.21.138.232,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3552,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "107.99.105.203",
"serverIP": "246.21.138.232"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,107.99.105.203,246.21.138.232,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,107.99.105.203,246.21.138.232,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 50929
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 07:57:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3552
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 107.99.105.203
serverIP: 246.21.138.232
|
Explain this syslog message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,87.218.56.165,138.166.19.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 50929,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 07:57:39",
"message": "<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,87.218.56.165,138.166.19.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3552,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "87.218.56.165",
"serverIP": "138.166.19.20"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,87.218.56.165,138.166.19.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 07:57:39 DC1-PA3220-1 1,2023/10/23 07:57:38,016201032964,TRAFFIC,drop,2562,2023/10/23 07:57:38,87.218.56.165,138.166.19.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 07:57:38,0,1,50929,3552,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 07:57:37,0,any,,7263933890481965234,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T07:57:39.003-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 50929
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 07:57:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3552
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 87.218.56.165
serverIP: 138.166.19.20
|
Explain this syslog message
|
<14>Oct 23 08:02:00 DC1-PA3220-1 1,2023/10/23 08:02:00,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:00,29.171.130.17,183.1.195.5,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:00,0,1,48300,59503,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:01:59,0,any,,7263933890481987069,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:00.995-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 59503,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 08:02:00",
"message": "<14>Oct 23 08:02:00 DC1-PA3220-1 1,2023/10/23 08:02:00,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:00,29.171.130.17,183.1.195.5,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:00,0,1,48300,59503,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:01:59,0,any,,7263933890481987069,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:00.995-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 48300,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "183.1.195.5",
"serverIP": "29.171.130.17"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 08:02:00 DC1-PA3220-1 1,2023/10/23 08:02:00,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:00,29.171.130.17,183.1.195.5,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:00,0,1,48300,59503,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:01:59,0,any,,7263933890481987069,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:00.995-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 08:02:00 DC1-PA3220-1 1,2023/10/23 08:02:00,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:00,29.171.130.17,183.1.195.5,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:00,0,1,48300,59503,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:01:59,0,any,,7263933890481987069,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:00.995-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 59503
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 08:02:00
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 48300
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 183.1.195.5
serverIP: 29.171.130.17
|
Explain this syslog message
|
<14>Oct 23 08:02:00 DC1-PA3220-1 1,2023/10/23 08:02:00,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:00,250.241.138.158,40.3.199.224,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:00,0,1,48300,59503,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:01:59,0,any,,7263933890481987069,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:00.995-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 59503,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 08:02:00",
"message": "<14>Oct 23 08:02:00 DC1-PA3220-1 1,2023/10/23 08:02:00,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:00,250.241.138.158,40.3.199.224,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:00,0,1,48300,59503,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:01:59,0,any,,7263933890481987069,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:00.995-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 48300,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "40.3.199.224",
"serverIP": "250.241.138.158"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 08:02:00 DC1-PA3220-1 1,2023/10/23 08:02:00,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:00,250.241.138.158,40.3.199.224,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:00,0,1,48300,59503,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:01:59,0,any,,7263933890481987069,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:00.995-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 08:02:00 DC1-PA3220-1 1,2023/10/23 08:02:00,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:00,250.241.138.158,40.3.199.224,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:00,0,1,48300,59503,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:01:59,0,any,,7263933890481987069,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:00.995-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 59503
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 08:02:00
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 48300
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 40.3.199.224
serverIP: 250.241.138.158
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attacmeed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attacmeed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@acme.bank"],"senderIP":"1.6.40.108","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=1.6.40.108 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=1.6.40.108 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "ap1@gosmartoffice.com",
"emailsendingserver": "40.107.243.104",
"emailsubject": "CalPrivate Bank - S-INV-0000010319",
"filehash": "<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>",
"filename": "from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatTime\":\"2023-10-23T14:39:04.000Z\",\"threat\":\"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatTime\":\"2023-10-23T13:52:49.000Z\",\"threat\":\"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-22T10:44:22.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"CalPrivate Bank - S-INV-0000010319\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\",\"yanroute\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":177623,\"headerFrom\":\"Accounts <ap1@gosmartoffice.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"ap1@gosmartoffice.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"fyoung@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2\",\"md5\":\"dc6e37ec07372cfb1085aa553e8297a0\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098\",\"md5\":\"66b5aeb5915bc33793a8c36288589029\",\"filename\":\"invoice - 10105008007835 hg0280446.msg\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/vnd.ms-outlook\",\"contentType\":\"application/vnd.ms-outlook\"},{\"disposition\":\"attacmeed\",\"sha256\":\"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d\",\"md5\":\"ce530b3dc1e760be597ce185f82f4c53\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/rtf\",\"contentType\":\"application/rtf\"},{\"disposition\":\"attacmeed\",\"sha256\":\"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf\",\"md5\":\"a44b8e55204b34f0efca2a4163640d57\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf\",\"md5\":\"d3fe2e21f1a5ef9cfc7b4e84a03b44c4\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf\",\"md5\":\"c64a68fe6bc0ce679dc981349dc3a167\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"321f17a3-aa30-ebec-b580-0bc6bea26dc0\",\"QID\":\"3tvagqgamk-1\",\"GUID\":\"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy\",\"sender\":\"ap1@gosmartoffice.com\",\"recipient\":[\"fyoung@acme.bank\"],\"senderIP\":\"1.6.40.108\",\"messageID\":\"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>\"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=1.6.40.108 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=1.6.40.108 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-22T10:44:22.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "1.6.40.108"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attacmeed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attacmeed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@acme.bank"],"senderIP":"1.6.40.108","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=1.6.40.108 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=1.6.40.108 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attacmeed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attacmeed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@acme.bank"],"senderIP":"1.6.40.108","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=1.6.40.108 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=1.6.40.108 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: ap1@gosmartoffice.com
emailsendingserver: 40.107.243.104
emailsubject: CalPrivate Bank - S-INV-0000010319
filehash: <CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>
filename: from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-22T10:44:22.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 1.6.40.108
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attstarked","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attstarked","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@stark.bank"],"senderIP":"216.77.75.227","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=216.77.75.227 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=216.77.75.227 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "ap1@gosmartoffice.com",
"emailsendingserver": "40.107.243.104",
"emailsubject": "CalPrivate Bank - S-INV-0000010319",
"filehash": "<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>",
"filename": "from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatTime\":\"2023-10-23T14:39:04.000Z\",\"threat\":\"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatTime\":\"2023-10-23T13:52:49.000Z\",\"threat\":\"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-22T10:44:22.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"CalPrivate Bank - S-INV-0000010319\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\",\"yanroute\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":177623,\"headerFrom\":\"Accounts <ap1@gosmartoffice.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"ap1@gosmartoffice.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"fyoung@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2\",\"md5\":\"dc6e37ec07372cfb1085aa553e8297a0\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098\",\"md5\":\"66b5aeb5915bc33793a8c36288589029\",\"filename\":\"invoice - 10105008007835 hg0280446.msg\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/vnd.ms-outlook\",\"contentType\":\"application/vnd.ms-outlook\"},{\"disposition\":\"attstarked\",\"sha256\":\"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d\",\"md5\":\"ce530b3dc1e760be597ce185f82f4c53\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/rtf\",\"contentType\":\"application/rtf\"},{\"disposition\":\"attstarked\",\"sha256\":\"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf\",\"md5\":\"a44b8e55204b34f0efca2a4163640d57\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf\",\"md5\":\"d3fe2e21f1a5ef9cfc7b4e84a03b44c4\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf\",\"md5\":\"c64a68fe6bc0ce679dc981349dc3a167\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"321f17a3-aa30-ebec-b580-0bc6bea26dc0\",\"QID\":\"3tvagqgamk-1\",\"GUID\":\"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy\",\"sender\":\"ap1@gosmartoffice.com\",\"recipient\":[\"fyoung@stark.bank\"],\"senderIP\":\"216.77.75.227\",\"messageID\":\"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>\"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=216.77.75.227 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=216.77.75.227 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-22T10:44:22.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "216.77.75.227"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attstarked","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attstarked","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@stark.bank"],"senderIP":"216.77.75.227","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=216.77.75.227 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=216.77.75.227 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attstarked","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attstarked","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@stark.bank"],"senderIP":"216.77.75.227","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=216.77.75.227 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=216.77.75.227 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: ap1@gosmartoffice.com
emailsendingserver: 40.107.243.104
emailsubject: CalPrivate Bank - S-INV-0000010319
filehash: <CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>
filename: from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-22T10:44:22.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 216.77.75.227
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"16.33.209.8","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=16.33.209.8 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=16.33.209.8 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "ap1@gosmartoffice.com",
"emailsendingserver": "40.107.243.104",
"emailsubject": "CalPrivate Bank - S-INV-0000010319",
"filehash": "<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>",
"filename": "from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatTime\":\"2023-10-23T14:39:04.000Z\",\"threat\":\"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatTime\":\"2023-10-23T13:52:49.000Z\",\"threat\":\"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-22T10:44:22.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"CalPrivate Bank - S-INV-0000010319\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\",\"yanroute\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":177623,\"headerFrom\":\"Accounts <ap1@gosmartoffice.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"ap1@gosmartoffice.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"fyoung@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2\",\"md5\":\"dc6e37ec07372cfb1085aa553e8297a0\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098\",\"md5\":\"66b5aeb5915bc33793a8c36288589029\",\"filename\":\"invoice - 10105008007835 hg0280446.msg\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/vnd.ms-outlook\",\"contentType\":\"application/vnd.ms-outlook\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d\",\"md5\":\"ce530b3dc1e760be597ce185f82f4c53\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/rtf\",\"contentType\":\"application/rtf\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf\",\"md5\":\"a44b8e55204b34f0efca2a4163640d57\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf\",\"md5\":\"d3fe2e21f1a5ef9cfc7b4e84a03b44c4\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf\",\"md5\":\"c64a68fe6bc0ce679dc981349dc3a167\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"321f17a3-aa30-ebec-b580-0bc6bea26dc0\",\"QID\":\"3tvagqgamk-1\",\"GUID\":\"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy\",\"sender\":\"ap1@gosmartoffice.com\",\"recipient\":[\"fyoung@umbrella.bank\"],\"senderIP\":\"16.33.209.8\",\"messageID\":\"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>\"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=16.33.209.8 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=16.33.209.8 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-22T10:44:22.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "16.33.209.8"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"16.33.209.8","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=16.33.209.8 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=16.33.209.8 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"16.33.209.8","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=16.33.209.8 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=16.33.209.8 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: ap1@gosmartoffice.com
emailsendingserver: 40.107.243.104
emailsubject: CalPrivate Bank - S-INV-0000010319
filehash: <CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>
filename: from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-22T10:44:22.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 16.33.209.8
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attacmeed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attacmeed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@acme.bank"],"senderIP":"243.12.33.252","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=243.12.33.252 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=243.12.33.252 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "ap1@gosmartoffice.com",
"emailsendingserver": "40.107.243.104",
"emailsubject": "CalPrivate Bank - S-INV-0000010319",
"filehash": "<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>",
"filename": "from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatTime\":\"2023-10-23T14:39:04.000Z\",\"threat\":\"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatTime\":\"2023-10-23T13:52:49.000Z\",\"threat\":\"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-22T10:44:22.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"CalPrivate Bank - S-INV-0000010319\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\",\"yanroute\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":177623,\"headerFrom\":\"Accounts <ap1@gosmartoffice.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"ap1@gosmartoffice.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"fyoung@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2\",\"md5\":\"dc6e37ec07372cfb1085aa553e8297a0\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098\",\"md5\":\"66b5aeb5915bc33793a8c36288589029\",\"filename\":\"invoice - 10105008007835 hg0280446.msg\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/vnd.ms-outlook\",\"contentType\":\"application/vnd.ms-outlook\"},{\"disposition\":\"attacmeed\",\"sha256\":\"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d\",\"md5\":\"ce530b3dc1e760be597ce185f82f4c53\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/rtf\",\"contentType\":\"application/rtf\"},{\"disposition\":\"attacmeed\",\"sha256\":\"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf\",\"md5\":\"a44b8e55204b34f0efca2a4163640d57\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf\",\"md5\":\"d3fe2e21f1a5ef9cfc7b4e84a03b44c4\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf\",\"md5\":\"c64a68fe6bc0ce679dc981349dc3a167\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"321f17a3-aa30-ebec-b580-0bc6bea26dc0\",\"QID\":\"3tvagqgamk-1\",\"GUID\":\"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy\",\"sender\":\"ap1@gosmartoffice.com\",\"recipient\":[\"fyoung@acme.bank\"],\"senderIP\":\"243.12.33.252\",\"messageID\":\"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>\"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=243.12.33.252 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=243.12.33.252 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-22T10:44:22.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "243.12.33.252"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attacmeed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attacmeed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@acme.bank"],"senderIP":"243.12.33.252","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=243.12.33.252 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=243.12.33.252 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attacmeed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attacmeed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@acme.bank"],"senderIP":"243.12.33.252","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=243.12.33.252 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=243.12.33.252 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: ap1@gosmartoffice.com
emailsendingserver: 40.107.243.104
emailsubject: CalPrivate Bank - S-INV-0000010319
filehash: <CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>
filename: from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-22T10:44:22.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 243.12.33.252
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"148.68.181.139","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=148.68.181.139 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=148.68.181.139 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "ap1@gosmartoffice.com",
"emailsendingserver": "40.107.243.104",
"emailsubject": "CalPrivate Bank - S-INV-0000010319",
"filehash": "<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>",
"filename": "from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatTime\":\"2023-10-23T14:39:04.000Z\",\"threat\":\"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatTime\":\"2023-10-23T13:52:49.000Z\",\"threat\":\"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-22T10:44:22.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"CalPrivate Bank - S-INV-0000010319\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\",\"yanroute\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":177623,\"headerFrom\":\"Accounts <ap1@gosmartoffice.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"ap1@gosmartoffice.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"fyoung@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2\",\"md5\":\"dc6e37ec07372cfb1085aa553e8297a0\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098\",\"md5\":\"66b5aeb5915bc33793a8c36288589029\",\"filename\":\"invoice - 10105008007835 hg0280446.msg\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/vnd.ms-outlook\",\"contentType\":\"application/vnd.ms-outlook\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d\",\"md5\":\"ce530b3dc1e760be597ce185f82f4c53\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/rtf\",\"contentType\":\"application/rtf\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf\",\"md5\":\"a44b8e55204b34f0efca2a4163640d57\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf\",\"md5\":\"d3fe2e21f1a5ef9cfc7b4e84a03b44c4\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf\",\"md5\":\"c64a68fe6bc0ce679dc981349dc3a167\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"321f17a3-aa30-ebec-b580-0bc6bea26dc0\",\"QID\":\"3tvagqgamk-1\",\"GUID\":\"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy\",\"sender\":\"ap1@gosmartoffice.com\",\"recipient\":[\"fyoung@umbrella.bank\"],\"senderIP\":\"148.68.181.139\",\"messageID\":\"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>\"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=148.68.181.139 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=148.68.181.139 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-22T10:44:22.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "148.68.181.139"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"148.68.181.139","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=148.68.181.139 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=148.68.181.139 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"148.68.181.139","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=148.68.181.139 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=148.68.181.139 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: ap1@gosmartoffice.com
emailsendingserver: 40.107.243.104
emailsubject: CalPrivate Bank - S-INV-0000010319
filehash: <CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>
filename: from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-22T10:44:22.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 148.68.181.139
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attwayneed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attwayneed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@wayne.bank"],"senderIP":"218.255.96.119","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=218.255.96.119 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=218.255.96.119 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "ap1@gosmartoffice.com",
"emailsendingserver": "40.107.243.104",
"emailsubject": "CalPrivate Bank - S-INV-0000010319",
"filehash": "<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>",
"filename": "from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatTime\":\"2023-10-23T14:39:04.000Z\",\"threat\":\"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatTime\":\"2023-10-23T13:52:49.000Z\",\"threat\":\"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-22T10:44:22.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"CalPrivate Bank - S-INV-0000010319\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\",\"yanroute\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":177623,\"headerFrom\":\"Accounts <ap1@gosmartoffice.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"ap1@gosmartoffice.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"fyoung@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2\",\"md5\":\"dc6e37ec07372cfb1085aa553e8297a0\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attwayneed\",\"sha256\":\"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098\",\"md5\":\"66b5aeb5915bc33793a8c36288589029\",\"filename\":\"invoice - 10105008007835 hg0280446.msg\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/vnd.ms-outlook\",\"contentType\":\"application/vnd.ms-outlook\"},{\"disposition\":\"attwayneed\",\"sha256\":\"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d\",\"md5\":\"ce530b3dc1e760be597ce185f82f4c53\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/rtf\",\"contentType\":\"application/rtf\"},{\"disposition\":\"attwayneed\",\"sha256\":\"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf\",\"md5\":\"a44b8e55204b34f0efca2a4163640d57\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf\",\"md5\":\"d3fe2e21f1a5ef9cfc7b4e84a03b44c4\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf\",\"md5\":\"c64a68fe6bc0ce679dc981349dc3a167\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"321f17a3-aa30-ebec-b580-0bc6bea26dc0\",\"QID\":\"3tvagqgamk-1\",\"GUID\":\"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy\",\"sender\":\"ap1@gosmartoffice.com\",\"recipient\":[\"fyoung@wayne.bank\"],\"senderIP\":\"218.255.96.119\",\"messageID\":\"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>\"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=218.255.96.119 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=218.255.96.119 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-22T10:44:22.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "218.255.96.119"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attwayneed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attwayneed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@wayne.bank"],"senderIP":"218.255.96.119","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=218.255.96.119 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=218.255.96.119 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attwayneed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attwayneed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@wayne.bank"],"senderIP":"218.255.96.119","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=218.255.96.119 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=218.255.96.119 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: ap1@gosmartoffice.com
emailsendingserver: 40.107.243.104
emailsubject: CalPrivate Bank - S-INV-0000010319
filehash: <CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>
filename: from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-22T10:44:22.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 218.255.96.119
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"12.215.26.12","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=12.215.26.12 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=12.215.26.12 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "ap1@gosmartoffice.com",
"emailsendingserver": "40.107.243.104",
"emailsubject": "CalPrivate Bank - S-INV-0000010319",
"filehash": "<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>",
"filename": "from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatTime\":\"2023-10-23T14:39:04.000Z\",\"threat\":\"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatTime\":\"2023-10-23T13:52:49.000Z\",\"threat\":\"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-22T10:44:22.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"CalPrivate Bank - S-INV-0000010319\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\",\"yanroute\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":177623,\"headerFrom\":\"Accounts <ap1@gosmartoffice.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"ap1@gosmartoffice.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"fyoung@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2\",\"md5\":\"dc6e37ec07372cfb1085aa553e8297a0\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098\",\"md5\":\"66b5aeb5915bc33793a8c36288589029\",\"filename\":\"invoice - 10105008007835 hg0280446.msg\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/vnd.ms-outlook\",\"contentType\":\"application/vnd.ms-outlook\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d\",\"md5\":\"ce530b3dc1e760be597ce185f82f4c53\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/rtf\",\"contentType\":\"application/rtf\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf\",\"md5\":\"a44b8e55204b34f0efca2a4163640d57\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf\",\"md5\":\"d3fe2e21f1a5ef9cfc7b4e84a03b44c4\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf\",\"md5\":\"c64a68fe6bc0ce679dc981349dc3a167\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"321f17a3-aa30-ebec-b580-0bc6bea26dc0\",\"QID\":\"3tvagqgamk-1\",\"GUID\":\"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy\",\"sender\":\"ap1@gosmartoffice.com\",\"recipient\":[\"fyoung@umbrella.bank\"],\"senderIP\":\"12.215.26.12\",\"messageID\":\"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>\"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=12.215.26.12 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=12.215.26.12 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-22T10:44:22.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "12.215.26.12"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"12.215.26.12","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=12.215.26.12 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=12.215.26.12 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attumbrellaed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attumbrellaed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@umbrella.bank"],"senderIP":"12.215.26.12","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=12.215.26.12 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=12.215.26.12 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: ap1@gosmartoffice.com
emailsendingserver: 40.107.243.104
emailsubject: CalPrivate Bank - S-INV-0000010319
filehash: <CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>
filename: from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-22T10:44:22.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 12.215.26.12
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attwayneed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attwayneed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@wayne.bank"],"senderIP":"184.209.178.180","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=184.209.178.180 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=184.209.178.180 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "ap1@gosmartoffice.com",
"emailsendingserver": "40.107.243.104",
"emailsubject": "CalPrivate Bank - S-INV-0000010319",
"filehash": "<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>",
"filename": "from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760\",\"threatTime\":\"2023-10-23T14:39:04.000Z\",\"threat\":\"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e\",\"threatTime\":\"2023-10-23T13:52:49.000Z\",\"threat\":\"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-22T10:44:22.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"CalPrivate Bank - S-INV-0000010319\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\",\"yanroute\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":177623,\"headerFrom\":\"Accounts <ap1@gosmartoffice.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"ap1@gosmartoffice.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"fyoung@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2\",\"md5\":\"dc6e37ec07372cfb1085aa553e8297a0\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attwayneed\",\"sha256\":\"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098\",\"md5\":\"66b5aeb5915bc33793a8c36288589029\",\"filename\":\"invoice - 10105008007835 hg0280446.msg\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/vnd.ms-outlook\",\"contentType\":\"application/vnd.ms-outlook\"},{\"disposition\":\"attwayneed\",\"sha256\":\"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d\",\"md5\":\"ce530b3dc1e760be597ce185f82f4c53\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/rtf\",\"contentType\":\"application/rtf\"},{\"disposition\":\"attwayneed\",\"sha256\":\"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf\",\"md5\":\"a44b8e55204b34f0efca2a4163640d57\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"},{\"disposition\":\"inline\",\"sha256\":\"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf\",\"md5\":\"d3fe2e21f1a5ef9cfc7b4e84a03b44c4\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf\",\"md5\":\"c64a68fe6bc0ce679dc981349dc3a167\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"321f17a3-aa30-ebec-b580-0bc6bea26dc0\",\"QID\":\"3tvagqgamk-1\",\"GUID\":\"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy\",\"sender\":\"ap1@gosmartoffice.com\",\"recipient\":[\"fyoung@wayne.bank\"],\"senderIP\":\"184.209.178.180\",\"messageID\":\"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>\"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=184.209.178.180 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=184.209.178.180 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-22T10:44:22.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "184.209.178.180"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attwayneed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attwayneed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@wayne.bank"],"senderIP":"184.209.178.180","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=184.209.178.180 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=184.209.178.180 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/618531766c8f1ea93f7107f725f94db320990a4550927dafb8b37fc59dc03760","threatTime":"2023-10-23T14:39:04.000Z","threat":"http://pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"},{"threatID":"77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/77f4e1fe753dc4782d533f50f9d13b6e8dcc007aa7c57cbb67f08f073b651c8e","threatTime":"2023-10-23T13:52:49.000Z","threat":"pub-b5b2e13a95eb437696adc86931bffc7a.r2.dev/blue.html","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-22T10:44:22.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"CalPrivate Bank - S-INV-0000010319","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound","allow_relay","yanroute"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":177623,"headerFrom":"Accounts <ap1@gosmartoffice.com>","headerReplyTo":null,"fromAddress":["ap1@gosmartoffice.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["fyoung@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"5ee7ae20cbcc9b78bf31af54831fd206e4fb3db9d0b00d141ece2b6ad056f0d2","md5":"dc6e37ec07372cfb1085aa553e8297a0","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"c275c484ce2d9e99a7499a909ed65b8aefa563ad63089a56c18396709d6eb098","md5":"66b5aeb5915bc33793a8c36288589029","filename":"invoice - 10105008007835 hg0280446.msg","sandboxStatus":"CLEAN","oContentType":"application/vnd.ms-outlook","contentType":"application/vnd.ms-outlook"},{"disposition":"attwayneed","sha256":"edcb807558c1eae66b40ad45d07c66113b6d0b9f8e6c598c6161b0fd76d1374d","md5":"ce530b3dc1e760be597ce185f82f4c53","filename":null,"sandboxStatus":"CLEAN","oContentType":"application/rtf","contentType":"application/rtf"},{"disposition":"attwayneed","sha256":"ba5fff498f2b7d93d285172fc55a99436efbdbf623b27b0fb39974f687536aaf","md5":"a44b8e55204b34f0efca2a4163640d57","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"},{"disposition":"inline","sha256":"c37fe5a2b5673280ae3054722248261e148f715c3d98cdffceabd2f453326adf","md5":"d3fe2e21f1a5ef9cfc7b4e84a03b44c4","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"a72907405a962641495b6e5846503d821cdc81048b1804caac1f8133dc8b4fcf","md5":"c64a68fe6bc0ce679dc981349dc3a167","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"321f17a3-aa30-ebec-b580-0bc6bea26dc0","QID":"3tvagqgamk-1","GUID":"LM5LS6qUc-IGV1FHmDIS1ByHl4YJqZVy","sender":"ap1@gosmartoffice.com","recipient":["fyoung@wayne.bank"],"senderIP":"184.209.178.180","messageID":"<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>"} ::: fileHash=<CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com> ::: fileName=from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319 ::: serverIP=184.209.178.180 ::: emailFrom=ap1@gosmartoffice.com ::: created_at=2023-10-22T10:44:22.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=CalPrivate Bank - S-INV-0000010319 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-22T10:44:22.000Z ::: emailSendingServer=184.209.178.180 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: ap1@gosmartoffice.com
emailsendingserver: 40.107.243.104
emailsubject: CalPrivate Bank - S-INV-0000010319
filehash: <CO3PR06MB860690C7B9556DC0A9286B67E4D9A@CO3PR06MB8606.namprd06.prod.outlook.com>
filename: from: ap1@gosmartoffice.com subj: CalPrivate Bank - S-INV-0000010319
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-22T10:44:22.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 184.209.178.180
|
Explain this syslog message
|
<14>Oct 23 08:02:16 DC1-PA3220-1 1,2023/10/23 08:02:15,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:15,74.203.85.235,60.195.181.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:15,0,1,48322,10009,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:02:15,0,any,,7263933890481988523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:16.214-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 48322,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 08:02:16",
"message": "<14>Oct 23 08:02:16 DC1-PA3220-1 1,2023/10/23 08:02:15,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:15,74.203.85.235,60.195.181.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:15,0,1,48322,10009,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:02:15,0,any,,7263933890481988523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:16.214-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 10009,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "74.203.85.235",
"serverIP": "60.195.181.229"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 08:02:16 DC1-PA3220-1 1,2023/10/23 08:02:15,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:15,74.203.85.235,60.195.181.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:15,0,1,48322,10009,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:02:15,0,any,,7263933890481988523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:16.214-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 08:02:16 DC1-PA3220-1 1,2023/10/23 08:02:15,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:15,74.203.85.235,60.195.181.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:15,0,1,48322,10009,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:02:15,0,any,,7263933890481988523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:16.214-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48322
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 08:02:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 10009
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 74.203.85.235
serverIP: 60.195.181.229
|
Explain this syslog message
|
<14>Oct 23 08:02:16 DC1-PA3220-1 1,2023/10/23 08:02:15,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:15,51.217.101.177,37.3.28.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:15,0,1,48322,10009,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:02:15,0,any,,7263933890481988523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:16.214-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 48322,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 08:02:16",
"message": "<14>Oct 23 08:02:16 DC1-PA3220-1 1,2023/10/23 08:02:15,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:15,51.217.101.177,37.3.28.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:15,0,1,48322,10009,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:02:15,0,any,,7263933890481988523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:16.214-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 10009,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "51.217.101.177",
"serverIP": "37.3.28.98"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 08:02:16 DC1-PA3220-1 1,2023/10/23 08:02:15,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:15,51.217.101.177,37.3.28.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:15,0,1,48322,10009,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:02:15,0,any,,7263933890481988523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:16.214-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 08:02:16 DC1-PA3220-1 1,2023/10/23 08:02:15,016201032964,TRAFFIC,drop,2562,2023/10/23 08:02:15,51.217.101.177,37.3.28.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 08:02:15,0,1,48322,10009,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 08:02:15,0,any,,7263933890481988523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T08:02:16.214-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48322
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 08:02:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 10009
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 51.217.101.177
serverIP: 37.3.28.98
|
Explain this syslog message
|
<14>Dec 21 16:23:55 DC1-PA3220-1 1,2023/12/21 16:23:55,016201032964,TRAFFIC,drop,2562,2023/12/21 16:23:55,255.0.67.69,214.252.146.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:23:55,0,1,47231,5191,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:23:52,0,any,,7299323810766325159,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:23:55.549-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47231,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:23:55",
"message": "<14>Dec 21 16:23:55 DC1-PA3220-1 1,2023/12/21 16:23:55,016201032964,TRAFFIC,drop,2562,2023/12/21 16:23:55,255.0.67.69,214.252.146.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:23:55,0,1,47231,5191,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:23:52,0,any,,7299323810766325159,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:23:55.549-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5191,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "255.0.67.69",
"serverIP": "214.252.146.178"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:23:55 DC1-PA3220-1 1,2023/12/21 16:23:55,016201032964,TRAFFIC,drop,2562,2023/12/21 16:23:55,255.0.67.69,214.252.146.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:23:55,0,1,47231,5191,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:23:52,0,any,,7299323810766325159,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:23:55.549-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:23:55 DC1-PA3220-1 1,2023/12/21 16:23:55,016201032964,TRAFFIC,drop,2562,2023/12/21 16:23:55,255.0.67.69,214.252.146.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:23:55,0,1,47231,5191,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:23:52,0,any,,7299323810766325159,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:23:55.549-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47231
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:23:55
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5191
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 255.0.67.69
serverIP: 214.252.146.178
|
Explain this syslog message
|
<14>Dec 21 16:23:55 DC1-PA3220-1 1,2023/12/21 16:23:55,016201032964,TRAFFIC,drop,2562,2023/12/21 16:23:55,96.232.73.21,89.142.145.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:23:55,0,1,47231,5191,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:23:52,0,any,,7299323810766325159,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:23:55.549-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47231,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:23:55",
"message": "<14>Dec 21 16:23:55 DC1-PA3220-1 1,2023/12/21 16:23:55,016201032964,TRAFFIC,drop,2562,2023/12/21 16:23:55,96.232.73.21,89.142.145.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:23:55,0,1,47231,5191,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:23:52,0,any,,7299323810766325159,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:23:55.549-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5191,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "96.232.73.21",
"serverIP": "89.142.145.119"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:23:55 DC1-PA3220-1 1,2023/12/21 16:23:55,016201032964,TRAFFIC,drop,2562,2023/12/21 16:23:55,96.232.73.21,89.142.145.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:23:55,0,1,47231,5191,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:23:52,0,any,,7299323810766325159,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:23:55.549-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:23:55 DC1-PA3220-1 1,2023/12/21 16:23:55,016201032964,TRAFFIC,drop,2562,2023/12/21 16:23:55,96.232.73.21,89.142.145.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:23:55,0,1,47231,5191,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:23:52,0,any,,7299323810766325159,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:23:55.549-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47231
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:23:55
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5191
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 96.232.73.21
serverIP: 89.142.145.119
|
Explain this syslog message
|
<14>Dec 21 16:25:32 DC1-PA3220-1 1,2023/12/21 16:25:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:32,46.88.218.225,188.245.157.158,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:32,0,1,52827,9874,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335692,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:32.646-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52827,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:25:32",
"message": "<14>Dec 21 16:25:32 DC1-PA3220-1 1,2023/12/21 16:25:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:32,46.88.218.225,188.245.157.158,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:32,0,1,52827,9874,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335692,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:32.646-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 9874,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "46.88.218.225",
"serverIP": "188.245.157.158"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:25:32 DC1-PA3220-1 1,2023/12/21 16:25:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:32,46.88.218.225,188.245.157.158,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:32,0,1,52827,9874,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335692,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:32.646-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:25:32 DC1-PA3220-1 1,2023/12/21 16:25:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:32,46.88.218.225,188.245.157.158,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:32,0,1,52827,9874,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335692,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:32.646-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52827
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:25:32
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 9874
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 46.88.218.225
serverIP: 188.245.157.158
|
Explain this syslog message
|
<14>Dec 21 16:25:32 DC1-PA3220-1 1,2023/12/21 16:25:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:32,80.202.118.136,111.230.224.39,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:32,0,1,52827,9874,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335692,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:32.646-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52827,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:25:32",
"message": "<14>Dec 21 16:25:32 DC1-PA3220-1 1,2023/12/21 16:25:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:32,80.202.118.136,111.230.224.39,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:32,0,1,52827,9874,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335692,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:32.646-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 9874,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "80.202.118.136",
"serverIP": "111.230.224.39"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:25:32 DC1-PA3220-1 1,2023/12/21 16:25:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:32,80.202.118.136,111.230.224.39,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:32,0,1,52827,9874,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335692,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:32.646-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:25:32 DC1-PA3220-1 1,2023/12/21 16:25:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:32,80.202.118.136,111.230.224.39,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:32,0,1,52827,9874,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335692,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:32.646-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52827
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:25:32
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 9874
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 80.202.118.136
serverIP: 111.230.224.39
|
Explain this syslog message
|
<14>Dec 21 16:25:33 DC1-PA3220-1 1,2023/12/21 16:25:33,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:33,124.217.29.97,51.59.180.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:33,0,1,45641,42409,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335792,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:33.498-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45641,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:25:33",
"message": "<14>Dec 21 16:25:33 DC1-PA3220-1 1,2023/12/21 16:25:33,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:33,124.217.29.97,51.59.180.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:33,0,1,45641,42409,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335792,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:33.498-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 42409,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "124.217.29.97",
"serverIP": "51.59.180.230"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:25:33 DC1-PA3220-1 1,2023/12/21 16:25:33,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:33,124.217.29.97,51.59.180.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:33,0,1,45641,42409,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335792,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:33.498-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:25:33 DC1-PA3220-1 1,2023/12/21 16:25:33,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:33,124.217.29.97,51.59.180.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:33,0,1,45641,42409,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335792,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:33.498-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45641
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:25:33
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 42409
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 124.217.29.97
serverIP: 51.59.180.230
|
Explain this syslog message
|
<14>Dec 21 16:25:33 DC1-PA3220-1 1,2023/12/21 16:25:33,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:33,113.163.58.34,129.230.51.191,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:33,0,1,45641,42409,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335792,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:33.498-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45641,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:25:33",
"message": "<14>Dec 21 16:25:33 DC1-PA3220-1 1,2023/12/21 16:25:33,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:33,113.163.58.34,129.230.51.191,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:33,0,1,45641,42409,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335792,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:33.498-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 42409,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "113.163.58.34",
"serverIP": "129.230.51.191"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:25:33 DC1-PA3220-1 1,2023/12/21 16:25:33,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:33,113.163.58.34,129.230.51.191,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:33,0,1,45641,42409,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335792,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:33.498-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:25:33 DC1-PA3220-1 1,2023/12/21 16:25:33,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:33,113.163.58.34,129.230.51.191,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:33,0,1,45641,42409,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:29,0,any,,7299323810766335792,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:33.498-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45641
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:25:33
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 42409
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 113.163.58.34
serverIP: 129.230.51.191
|
Explain this syslog message
|
<14>Dec 21 16:25:23 DC1-PA3220-1 1,2023/12/21 16:25:23,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:23,229.183.251.2,19.102.42.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:23,0,1,26200,2561,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:20,0,any,,7299323810766334721,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:23.245-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 26200,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:25:23",
"message": "<14>Dec 21 16:25:23 DC1-PA3220-1 1,2023/12/21 16:25:23,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:23,229.183.251.2,19.102.42.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:23,0,1,26200,2561,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:20,0,any,,7299323810766334721,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:23.245-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2561,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "229.183.251.2",
"serverIP": "19.102.42.88"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:25:23 DC1-PA3220-1 1,2023/12/21 16:25:23,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:23,229.183.251.2,19.102.42.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:23,0,1,26200,2561,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:20,0,any,,7299323810766334721,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:23.245-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:25:23 DC1-PA3220-1 1,2023/12/21 16:25:23,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:23,229.183.251.2,19.102.42.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:23,0,1,26200,2561,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:20,0,any,,7299323810766334721,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:23.245-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 26200
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:25:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2561
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 229.183.251.2
serverIP: 19.102.42.88
|
Explain this syslog message
|
<14>Dec 21 16:25:23 DC1-PA3220-1 1,2023/12/21 16:25:23,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:23,243.1.138.54,36.78.238.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:23,0,1,26200,2561,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:20,0,any,,7299323810766334721,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:23.245-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 26200,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:25:23",
"message": "<14>Dec 21 16:25:23 DC1-PA3220-1 1,2023/12/21 16:25:23,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:23,243.1.138.54,36.78.238.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:23,0,1,26200,2561,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:20,0,any,,7299323810766334721,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:23.245-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2561,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "243.1.138.54",
"serverIP": "36.78.238.38"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:25:23 DC1-PA3220-1 1,2023/12/21 16:25:23,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:23,243.1.138.54,36.78.238.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:23,0,1,26200,2561,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:20,0,any,,7299323810766334721,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:23.245-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:25:23 DC1-PA3220-1 1,2023/12/21 16:25:23,016201032964,TRAFFIC,drop,2562,2023/12/21 16:25:23,243.1.138.54,36.78.238.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:25:23,0,1,26200,2561,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:25:20,0,any,,7299323810766334721,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:25:23.245-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 26200
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:25:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2561
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 243.1.138.54
serverIP: 36.78.238.38
|
Explain this syslog message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,102.238.75.125,91.70.98.41,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65022,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:31:27",
"message": "<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,102.238.75.125,91.70.98.41,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 52298,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "91.70.98.41",
"serverIP": "102.238.75.125"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,102.238.75.125,91.70.98.41,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,102.238.75.125,91.70.98.41,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65022
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:31:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 52298
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 91.70.98.41
serverIP: 102.238.75.125
|
Explain this syslog message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,204.231.91.148,3.156.61.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65022,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:31:27",
"message": "<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,204.231.91.148,3.156.61.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 52298,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "3.156.61.132",
"serverIP": "204.231.91.148"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,204.231.91.148,3.156.61.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,204.231.91.148,3.156.61.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65022
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:31:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 52298
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 3.156.61.132
serverIP: 204.231.91.148
|
Explain this syslog message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,142.223.150.185,215.42.31.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65022,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:31:27",
"message": "<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,142.223.150.185,215.42.31.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 52298,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "215.42.31.236",
"serverIP": "142.223.150.185"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,142.223.150.185,215.42.31.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:31:27 DC1-PA3220-1 1,2023/12/21 16:31:27,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:27,142.223.150.185,215.42.31.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:27,0,1,52298,65022,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:23,0,any,,7299323810766373148,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:27.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65022
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:31:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 52298
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 215.42.31.236
serverIP: 142.223.150.185
|
Explain this syslog message
|
<14>Dec 21 16:31:16 DC1-PA3220-1 1,2023/12/21 16:31:16,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:16,64.124.204.38,234.35.9.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:16,0,1,41126,35903,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:13,0,any,,7299323810766371908,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:16.611-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41126,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:31:16",
"message": "<14>Dec 21 16:31:16 DC1-PA3220-1 1,2023/12/21 16:31:16,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:16,64.124.204.38,234.35.9.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:16,0,1,41126,35903,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:13,0,any,,7299323810766371908,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:16.611-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 35903,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "64.124.204.38",
"serverIP": "234.35.9.76"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:31:16 DC1-PA3220-1 1,2023/12/21 16:31:16,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:16,64.124.204.38,234.35.9.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:16,0,1,41126,35903,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:13,0,any,,7299323810766371908,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:16.611-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:31:16 DC1-PA3220-1 1,2023/12/21 16:31:16,016201032964,TRAFFIC,drop,2562,2023/12/21 16:31:16,64.124.204.38,234.35.9.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:31:16,0,1,41126,35903,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:31:13,0,any,,7299323810766371908,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:31:16.611-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41126
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:31:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 35903
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 64.124.204.38
serverIP: 234.35.9.76
|
Explain this syslog message
|
<14>Dec 21 16:32:24 DC1-PA3220-1 1,2023/12/21 16:32:24,016201032964,TRAFFIC,drop,2562,2023/12/21 16:32:24,232.136.239.116,96.114.26.52,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:32:24,0,1,45580,52629,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:32:21,0,any,,7299323810766378946,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:32:24.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 52629,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:32:24",
"message": "<14>Dec 21 16:32:24 DC1-PA3220-1 1,2023/12/21 16:32:24,016201032964,TRAFFIC,drop,2562,2023/12/21 16:32:24,232.136.239.116,96.114.26.52,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:32:24,0,1,45580,52629,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:32:21,0,any,,7299323810766378946,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:32:24.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 45580,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "96.114.26.52",
"serverIP": "232.136.239.116"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:32:24 DC1-PA3220-1 1,2023/12/21 16:32:24,016201032964,TRAFFIC,drop,2562,2023/12/21 16:32:24,232.136.239.116,96.114.26.52,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:32:24,0,1,45580,52629,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:32:21,0,any,,7299323810766378946,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:32:24.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:32:24 DC1-PA3220-1 1,2023/12/21 16:32:24,016201032964,TRAFFIC,drop,2562,2023/12/21 16:32:24,232.136.239.116,96.114.26.52,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:32:24,0,1,45580,52629,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:32:21,0,any,,7299323810766378946,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:32:24.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 52629
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:32:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 45580
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 96.114.26.52
serverIP: 232.136.239.116
|
Explain this syslog message
|
<14>Dec 21 16:32:24 DC1-PA3220-1 1,2023/12/21 16:32:24,016201032964,TRAFFIC,drop,2562,2023/12/21 16:32:24,162.158.72.183,217.121.242.14,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:32:24,0,1,45580,52629,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:32:21,0,any,,7299323810766378946,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:32:24.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 52629,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:32:24",
"message": "<14>Dec 21 16:32:24 DC1-PA3220-1 1,2023/12/21 16:32:24,016201032964,TRAFFIC,drop,2562,2023/12/21 16:32:24,162.158.72.183,217.121.242.14,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:32:24,0,1,45580,52629,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:32:21,0,any,,7299323810766378946,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:32:24.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 45580,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "217.121.242.14",
"serverIP": "162.158.72.183"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:32:24 DC1-PA3220-1 1,2023/12/21 16:32:24,016201032964,TRAFFIC,drop,2562,2023/12/21 16:32:24,162.158.72.183,217.121.242.14,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:32:24,0,1,45580,52629,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:32:21,0,any,,7299323810766378946,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:32:24.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:32:24 DC1-PA3220-1 1,2023/12/21 16:32:24,016201032964,TRAFFIC,drop,2562,2023/12/21 16:32:24,162.158.72.183,217.121.242.14,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:32:24,0,1,45580,52629,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:32:21,0,any,,7299323810766378946,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:32:24.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 52629
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:32:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 45580
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 217.121.242.14
serverIP: 162.158.72.183
|
Explain this syslog message
|
<14>Dec 21 16:33:08 DC1-PA3220-1 1,2023/12/21 16:33:08,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:08,182.122.89.171,56.218.133.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:08,0,1,44929,445,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:04,0,any,,7299323810766383016,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:08.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44929,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:33:08",
"message": "<14>Dec 21 16:33:08 DC1-PA3220-1 1,2023/12/21 16:33:08,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:08,182.122.89.171,56.218.133.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:08,0,1,44929,445,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:04,0,any,,7299323810766383016,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:08.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "182.122.89.171",
"serverIP": "56.218.133.69"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:33:08 DC1-PA3220-1 1,2023/12/21 16:33:08,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:08,182.122.89.171,56.218.133.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:08,0,1,44929,445,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:04,0,any,,7299323810766383016,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:08.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:33:08 DC1-PA3220-1 1,2023/12/21 16:33:08,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:08,182.122.89.171,56.218.133.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:08,0,1,44929,445,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:04,0,any,,7299323810766383016,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:08.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44929
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:33:08
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 445
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 182.122.89.171
serverIP: 56.218.133.69
|
Explain this syslog message
|
<14>Dec 21 16:33:08 DC1-PA3220-1 1,2023/12/21 16:33:08,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:08,189.206.255.188,114.55.197.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:08,0,1,44929,445,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:04,0,any,,7299323810766383016,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:08.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44929,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:33:08",
"message": "<14>Dec 21 16:33:08 DC1-PA3220-1 1,2023/12/21 16:33:08,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:08,189.206.255.188,114.55.197.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:08,0,1,44929,445,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:04,0,any,,7299323810766383016,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:08.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "189.206.255.188",
"serverIP": "114.55.197.164"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:33:08 DC1-PA3220-1 1,2023/12/21 16:33:08,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:08,189.206.255.188,114.55.197.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:08,0,1,44929,445,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:04,0,any,,7299323810766383016,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:08.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.