CHR(100)||CHR(85)||CHR(102)||CHR(83) translates to the string "dUfS" .The code asks the database: "Does dUfS equal dUfS?" Since this is always true, the database will process the request without an error.
The reference to SYSIBM.SYSDUMMY1 is a dead giveaway that the target is an IBM DB2 database. This is a special "one-row, one-column" table used to perform calculations or retrieve system values.
The 'KEYWORD' starts by closing a legitimate search or input field with a single quote. This allows the attacker to append their own logic.
If the website loads normally, the attacker knows the database processed the "True" statement ( dUfS = dUfS ) successfully.