TREND MICRO                    ™
Deep Discovery Inspector
                          Syslog Content Mapping Guide
                          Breakthrough Protection Against APTs and Targeted Attacks
   es                  ns                 pc
Endpoint Security   Network Security   Protected Cloud
Trend Micro Incorporated reserves the right to make changes to this
document and to the product described herein without notice. Before
installing and using the product, review the readme files, release notes,
and/or the latest version of the applicable documentation, which are
available from the Trend Micro website at:
http://docs.trendmicro.com
Trend Micro, the Trend Micro t-ball logo, Deep Discovery Advisor, Deep
Discovery Analyzer, Deep Discovery Inspector, and Control Manager are
trademarks or registered trademarks of Trend Micro Incorporated. All other
product or company names may be trademarks or registered trademarks of
their owners.
Copyright © 2020. Trend Micro Incorporated. All rights reserved.
Document Part No.: APEM59039/200721
Release Date: August 2020
Protected by U.S. Patent No.: 8595840; 8925074; 7707635; 8505094
This documentation introduces the main features of the product and/or
provides installation instructions for a production environment. Read
through the documentation before installing or using the product.
Detailed information about how to use specific features within the product
may be available at the Trend Micro Online Help Center and/or the Trend
Micro Knowledge Base.
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please contact us at docs@trendmicro.com.
Evaluate this documentation on the following site:
https://www.trendmicro.com/download/documentation/rating.asp
Privacy and Personal Data Collection Disclosure
Certain features available in Trend Micro products collect and send feedback
regarding product usage and detection information to Trend Micro. Some of
this data is considered personal in certain jurisdictions and under certain
regulations. If you do not want Trend Micro to collect personal data, you
must ensure that you disable the related features.
The following link outlines the types of data that Deep Discovery Inspector
collects and provides detailed instructions on how to disable the specific
features that feedback the information.
https://success.trendmicro.com/data-collection-disclosure
Data collected by Trend Micro is subject to the conditions stated in the Trend
Micro Privacy Notice:
https://www.trendmicro.com/privacy
Table of Contents
 Chapter 1: Introduction
          Terminology ....................................................................... 1-2
 Chapter 2: Revisions
 Chapter 3: Syslog Content Mapping - CEF
          CEF Threat Logs ................................................................. 3-2
          CEF Disruptive Application Logs .......................................... 3-7
          CEF Web Reputation Logs ................................................... 3-9
          CEF System Logs ............................................................... 3-13
          CEF Virtual Analyzer Logs: File Analysis Events .................. 3-15
          CEF Virtual Analyzer Logs: Notable Characteristics Events .. 3-17
          CEF Virtual Analyzer Logs: Deny List Transaction Events .... 3-19
 Chapter 4: Syslog Content Mapping - LEEF
          LEEF Threat Logs ............................................................... 4-2
          LEEF Disruptive Application Logs ........................................ 4-9
          LEEF Web Reputation Logs ................................................ 4-12
          LEEF System Logs ............................................................. 4-16
          LEEF Correlation Incident Logs ......................................... 4-17
          LEEF Virtual Analyzer Logs: File Analysis Events ................ 4-20
          LEEF Virtual Analyzer Logs: Notable Characteristics Events 4-22
          LEEF Virtual Analyzer Logs: Deny List Transaction Event .... 4-24
                                                                                                i
Trend Micro Deep Discovery Inspector Syslog Guide
     Chapter 5: Syslog Content Mapping - TMEF
                       TMEF Threat Logs .............................................................. 5-2
                       TMEF Disruptive Application Logs ..................................... 5-11
                       TMEF Web Reputation Logs ............................................... 5-15
                       TMEF System Logs ............................................................ 5-20
                       TMEF Correlated Incident Logs ......................................... 5-22
                       TMEF Virtual Analyzer Logs: File Analysis Events ............... 5-24
                       TMEF Virtual Analyzer Logs: Notable Characteristics Events 5-26
                       TMEF Virtual Analyzer Logs: Deny List Transaction Events . 5-28
                       TMEF Retro Scan Report Logs ............................................ 5-30
                       TMEF Retro Scan Detection Logs ....................................... 5-31
ii
                                          Preface
Preface
 Learn more about the following topics:
 •   Documentation on page iv
 •   Audience on page v
 •   Document Conventions on page v
 •   About Trend Micro on page vi
                                                iii
Trend Micro Deep Discovery Inspector Syslog Guide
Documentation
     The documentation set for Deep Discovery Inspector includes the following:
     Table 1. Product Documentation
                Document                                          Description
      Administrator's Guide                The Administrator's Guide contains detailed instructions on
                                           how to configure and manage Deep Discovery Inspector, and
                                           explanations on Deep Discovery Inspector concepts and
                                           features.
      AWS Deployment Guide                 The AWS Deployment Guide contains information about
                                           requirements and procedures for planning deployment,
                                           deploying, and troubleshooting Deep Discovery Inspector
                                           deployment on AWS.
      Installation and Deployment          The Installation and Deployment Guide contains information
      Guide                                about requirements and procedures for planning deployment,
                                           installing Deep Discovery Inspector, and using the
                                           Preconfiguration Console to set initial configurations and
                                           perform system tasks.
      Syslog Content Mapping               The Syslog Content Mapping Guide provides information about
      Guide                                log management standards and syntaxes for implementing
                                           syslog events in Deep Discovery Inspector.
      Quick Start Card                     The Quick Start Card provides user-friendly instructions on
                                           connecting Deep Discovery Inspector to your network and on
                                           performing the initial configuration.
      Readme                               The Readme contains late-breaking product information that is
                                           not found in the online or printed documentation. Topics
                                           include a description of new features, known issues, and
                                           product release history.
      Online Help                          Web-based documentation that is accessible from the Deep
                                           Discovery Inspector management console.
                                           The Online Help contains explanations of Deep Discovery
                                           Inspector components and features, as well as procedures
                                           needed to configure Deep Discovery Inspector.
iv
                                                                                        Preface
              Document                                 Description
      Support Portal           The Support Portal is an online database of problem-solving
                               and troubleshooting information. It provides the latest
                               information about known product issues. To access the
                               Support Portal, go to the following website:
                               https://success.trendmicro.com
  View and download product documentation from the Trend Micro Online
  Help Center:
  https://docs.trendmicro.com/en-us/home.aspx
Audience
  The Deep Discovery Inspector documentation is written for IT
  administrators and security analysts. The documentation assumes that the
  reader has an in-depth knowledge of networking and information security,
  including the following topics:
  •       Network topologies
  •       Database management
  •       Antivirus and content security protection
  The documentation does not assume the reader has any knowledge of
  sandbox environments or threat event correlation.
Document Conventions
  The documentation uses the following conventions:
                                                                                             v
Trend Micro Deep Discovery Inspector Syslog Guide
     Table 2. Document Conventions
                 Convention                                          Description
      UPPER CASE                             Acronyms, abbreviations, and names of certain commands
                                             and keys on the keyboard
      Bold                                   Menus and menu commands, command buttons, tabs, and
                                             options
      Italics                                References to other documents
      Monospace                              Sample command lines, program code, web URLs, file names,
                                             and program output
      Navigation > Path                      The navigation path to reach a particular screen
                                             For example, File > Save means, click File and then click
                                             Save on the interface
                                             Configuration notes
                Note
                                             Recommendations or suggestions
                Tip
                                             Information regarding required or default configuration
                Important
                                             settings and product limitations
                                             Critical actions and configuration options
                WARNING!
About Trend Micro
     Trend Micro, a global leader in cybersecurity, is passionate about making the
     world safe for exchanging digital information today and in the future.
     Artfully applying our XGen™ security strategy, our innovative solutions for
     consumers, businesses, and governments deliver connected security for data
     centers, cloud workloads, networks, and endpoints.
vi
                                                                        Preface
Optimized for leading environments, including Amazon Web Services,
Microsoft®, and VMware®, our layered solutions enable organizations to
automate the protection of valuable information from today’s threats. Our
connected threat defense enables seamless sharing of threat intelligence and
provides centralized visibility and investigation to make organizations their
most resilient.
Trend Micro customers include 9 of the top 10 Fortune® Global 500
companies across automotive, banking, healthcare, telecommunications,
and petroleum industries.
With over 6,500 employees in 50 countries and the world’s most advanced
global threat research and intelligence, Trend Micro enables organizations to
secure their connected world. https://www.trendmicro.com
                                                                            vii
                                                                    Chapter 1
Introduction
 The Trend Micro™ Syslog Content Mapping Guide provides information
 about log management standards and syntaxes for implementing syslog
 events in Trend Micro Deep Discovery Inspector.
 To enable flexible integration with third-party log management systems,
 Deep Discovery Inspector supports the following syslog formats:
           Log Management System                                   Description
  Common Event Format (CEF)                        CEF is an open log management standard
                                                   created by HP ArcSight.
  For details, see Syslog Content Mapping - CEF
  on page 3-1                                      Deep Discovery Inspector uses a subset of the
                                                   CEF dictionary.
  Log Event Extended Format (LEEF)                 LEEF is an event format developed for IBM
                                                   Security QRadar.
  For details, see Syslog Content Mapping - LEEF
  on page 4-1                                      Deep Discovery Inspector uses a subset of the
                                                   LEEF dictionary.
  Trend Micro Event Format (TMEF)                  TMEF is a superset of log fields that allow a
                                                   third-party syslog collector to better control
  For details, see Syslog Content Mapping - TMEF   and mitigate detection events provided by
  on page 5-1                                      Deep Discovery Inspector.
                                                                                                    1-1
Trend Micro Deep Discovery Inspector Syslog Guide
Terminology
             Term                                        Description
      CEF                    Common Event Format
      LEEF                   Log Event Extended Format
      TMEF                   Trend Micro Event Format
      CCCA                   Command and Control Contact Alert
1-2
                                            Chapter 2
Revisions
 There were no revisions for version 5.7.
                                                    2-1
                                                        Chapter 3
Syslog Content Mapping - CEF
 The following tables outline syslog content mapping between Deep
 Discovery Inspector log output and CEF syslog types:
 •   CEF Threat Logs on page 3-2
 •   CEF Disruptive Application Logs on page 3-7
 •   CEF Web Reputation Logs on page 3-9
 •   CEF System Logs on page 3-13
 •   CEF Virtual Analyzer Logs: File Analysis Events on page 3-15
 •   CEF Virtual Analyzer Logs: Notable Characteristics Events on page 3-17
 •   CEF Virtual Analyzer Logs: Deny List Transaction Events on page 3-19
                                                                              3-1
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Threat Logs
      Table 3-1. CEF Threat Logs
                 CEF Key                       Description                          Value
       Header (logVer)                  CEF format version         CEF: 0
       Header (vendor)                  Appliance vendor           Trend Micro
       Header (pname)                   Appliance product          Deep Discovery Inspector
       Header (pver)                    Appliance version          Example: 3.8.1181
       Header (eventid)                 Event ID                   Example: 8
       Header (eventName)               Description                Example: Packed executable file
                                                                   copied to a network administrative
                                                                   share
       Header (severity)                Severity                   •   2: Informational
                                                                   •   4: Low
                                                                   •   6: Medium
                                                                   •   8: High
       act                              The action in the event    blocked or not blocked
       app                              Protocol                   Example: HTTP
       c6a1                             Interested IPv6            Example: 2001:0:0:1::21
       c6a1Label                        Interested IPv6            InterestedIPv6
       c6a2                             Source IPv6 address        Example: 2001:0:0:1::21
       c6a2Label                        Source IPv6 address        Source IPv6 Address
       c6a3                             Destination IPv6 address   Example: 2001:0:0:1::21
       c6a3Label                        Destination IPv6 address   Destination IPv6 Address
       c6a4                             Peer IPv6 address          Example: 2001:0:0:1::21
       c6a4Label                        Peer IPv6 address          PeerIPv6
3-2
                                                             Syslog Content Mapping - CEF
           CEF Key         Description                           Value
cat                  Event category            Example: File
cnt                  Total count               Example: 1
cn1                  CCCA detection            0 or 1
cn1Label             CCCA detection            CCCA_Detection
cn3                  Threat type               •    0: Malicious content
                                               •    1: Malicious behavior
                                               •    2: Suspicious behavior
                                               •    3: Exploit
                                               •    4: Grayware
cn3Label             Threat type               Threat Type
cs1                  Mail subject              Example: hello
cs1Label             Mail subject              MailSubject
cs2                  Malware name              Example: HEUR_NAMETRICK.A
cs2Label             Malware name              DetectionName
cs3                  Host name                 Example: CLIENT1
cs3Label             Host name                 HostName_Ext
cs4                  File name in archive      Example: mtxlegih.dll
cs4Label             File name in archive      FileNameInArchive
cs5                  CCCA log is detected by   Example:
                                               GLOBAL_INTELLIGENCE or
                                               VIRTUAL_ANALYZER or
                                               USER_DEFINED
cs5Label             CCCA log is detected by   CCCA_DetectionSource
                                                                                     3-3
Trend Micro Deep Discovery Inspector Syslog Guide
                 CEF Key                       Description                        Value
      cs6                               Attack Phase               •   Intelligence Gathering
                                                                   •   Point of Entry
                                                                   •   Command and Control
                                                                       Communication
                                                                   •   Lateral Movement
                                                                   •   Asset and Data Discovery
                                                                   •   Data Exfiltration
                                                                   •   Nil (no applicable attack phase)
      cs6Label                          Attack Phase               pAttackPhase
      destinationTranslatedAdd          Peer IP                    Example: 10.1.144.199
      ress
      deviceDirection                   Packet direction           •   0: Source is external
                                                                   •   1: Source is internal
                                                                   •   2: Unknown
      deviceExternalId                  Appliance GUID             Example: 6B593E17AFB7-40FBBB28-
                                                                   A4CE-0462-A536
      devicePayloadId                   An extendable field.       Examples:
                                        Format: {threat_type}:     •   With pcap file captured:
                                        {log_id}:{with pcap file       2:10245:P
                                        captured}{:extensions}*
                                                                   •   Without pcap file captured:
                                                                       2:10245:
      dhost                             Destination host name      Example: dhost1
      dmac                              Destination MAC            Example: 00:0C:29:6E:CB:F9
      dpt                               Destination port           Value between 0 and 65535
      dst                               Destination IP address     Example: 10.1.144.199
      duser                             Mail recipient             Example: duser1
3-4
                                                                     Syslog Content Mapping - CEF
           CEF Key                Description                          Value
dvc                        Appliance IP address        Example: 10.1.144.199
dvchost                    Appliance host name         Example: localhost
dvcmac                     Appliance MAC address       Example: 00:0C:29:6E:CB:F9
fileHash                   SHA1                        Example:1EDD5B38DE47295457670
                                                       88C5CAB395E4197C8F3
filePath                   File path                   Example: SHARE\\
fileType                   Real file type              Example: 1638400
flexNumber1                vLANId                      Example: 4095
flexNumber1Label           vLANId                      vLANId
fname                      File name                   Example: excel.rar
fsize                      File size                   Example: 131372
oldFileHash                Mail attachment SHA1        Example:1EDD5B38DE47295457670
                                                       88C5CAB395E4197C8F3
oldFileName                Mail attachment file name   Example: excel.rar
oldFileSize                Mail attachment file size   Example: 150000
oldFileType                Mail attachment file type   Example: 1638400
requestClientApplication   User agent                  Example: IE
request                    URL                         Example: http://1.2.3.4/query?
                                                       term=value
rt                         Log generation time         Example: Mar 09 2015 17:05:21 GMT
                                                       +08:00
shost                      Source host name            Example: shost1
smac                       Source MAC                  Example: 00:0C:29:6E:CB:F9
sourceTranslatedAddress    Interested IP               Example: 10.1.144.199
src                        Source IP address           Example: 10.1.144.199
                                                                                             3-5
Trend Micro Deep Discovery Inspector Syslog Guide
                 CEF Key                       Description                Value
      spt                               Source port          Value between 0 and 65535
      suid                              User name            Example: User1
      suser                             Mail sender          Example: suser1
      Log sample:
      CEF:0|Trend Micro|Deep Discovery Inspector|5.0.1329|0|
      Eicar_test_file
      - HTTP (Response)|8|dvc=172.22.9.32
      dvcmac=00:50:56:AD:03:BD
      dvchost=localhost deviceExternalId=E9A3FA433916-
      4738984C-A4BF-84A0-D603
      rt=Jun 22 2017 09:42:47 GMT+08:00 app=HTTP
      deviceDirection=1
      dhost=172.22.9.5 dst=172.22.9.5 dpt=57908
      dmac=00:50:56:82:e7:a9
      shost=172.22.9.54 src=172.22.9.54 spt=80
      smac=00:50:56:82:c6:ae
      cs3Label=HostName_Ext cs3=172.22.9.54 cs2Label=
      DetectionName
      cs2=Eicar_test_file fname=eicarcom2.zip fileType=
      262340608
      fsize=308 requestClientApplication=Wget/1.12 (linux-gnu)
      act=not blocked cn3Label=Threat Type cn3=0
      destinationTranslatedAddress=172.22.9.5
      fileHash=BEC1B52D350D721C7E22A6D4BB0A92909893A3AE
      cs4Label=FileNameInArchive cs4=eicar.com
      sourceTranslatedAddress=172.22.9.54
      cnt=1 cat=Malware cs6Label=pAttackPhase cs6=Point
      of Entry flexNumber1Label=vLANId flexNumber1=4095
      request=http://172.22.9.54/eicarcom2.zip
      devicePayloadId=0:143:P
3-6
                                                                       Syslog Content Mapping - CEF
CEF Disruptive Application Logs
  Table 3-2. CEF Disruptive Application Logs
           CEF Key                  Description                           Value
   Header (logVer)            CEF format version         CEF: 0
   Header (vendor)            Appliance vendor           Trend Micro
   Header (pname)             Appliance product          Deep Discovery Inspector
   Header (pver)              Appliance version          Example: 3.8.1181
   Header (eventid)           Signature ID               100120
   Header (eventName)         Description                Deep Discovery Inspector detected
                                                         this protocol in your monitored
                                                         network.
   Header (severity)          Severity                   •   2: Informational
                                                         •   4: Low
                                                         •   6: Medium
                                                         •   8: High
   app                        Protocol                   Example: HTTP
   c6a1                       Interested IPv6            Example: 2001:0:0:1::21
   c6a1Label                  Interested IPv6            InterestedIPv6
   c6a2                       Source IPv6 address        Example: 2001:0:0:1::21
   c6a2Label                  Source IPv6 address        Source IPv6 Address
   c6a3                       Destination IPv6 address   Example: 2001:0:0:1::21
   c6a3Label                  Destination IPv6 address   Destination IPv6 Address
   c6a4                       Peer IPv6 address          Example: 2001:0:0:1::21
   c6a4Label                  Peer IPv6 address          PeerIPv6
   cnt                        Total count                Example: 1
                                                                                               3-7
Trend Micro Deep Discovery Inspector Syslog Guide
                 CEF Key                       Description                         Value
      cn3                               Threat type                6
      cn3Label                          Threat type                ThreatType
      destinationTranslatedAdd          Peer IP                    Example: 10.1.144.199
      ress
      deviceDirection                   Packet direction           •   0: Source is external
                                                                   •   1: Source is internal
                                                                   •   2: Unknown
      deviceExternalId                  Appliance GUID             Example: 6B593E17AFB7-40FBBB28-
                                                                   A4CE-0462-A536
      devicePayloadId                   An extendable field.       Examples:
                                        Format: {threat_type}:     •   With pcap file captured:
                                        {log_id}:{with pcap file       2:10245:P
                                        captured}{:extensions}*
                                                                   •   Without pcap file captured:
                                                                       2:10245:
      dhost                             Destination host name      Example: dhost1
      dmac                              Destination MAC            Example: 00:0C:29:6E:CB:F9
      dpt                               Destination port           Value between 0 and 65535
      dst                               Destination IP address     Example: 10.1.144.199
      dvc                               Appliance IP address       Example: 10.1.144.199
      dvchost                           Appliance host name        Example: localhost
      dvcmac                            Appliance MAC address      Example: 00:0C:29:6E:CB:F9
      flexNumber1                       vLANId                     Example: 4095
      flexNumber1Label                  vLANId                     vLANId
      rt                                Log generation time        Example: Mar 09 2015 17:05:21 GMT
                                                                   +08:00
3-8
                                                                Syslog Content Mapping - CEF
           CEF Key                 Description                   Value
   shost                     Source host name     Example: shost1
   smac                      Source MAC           Example: 00:0C:29:6E:CB:F9
   sourceTranslatedAddress   Interested IP        Example: 10.1.144.199
   spt                       Source port          Value between 0 and 65535
   src                       Source IP address    Example: 10.1.144.199
  Log Sample:
  CEF:0|Trend Micro|Deep Discovery Inspector|5.0.1329|
  100120|Deep
  Discovery Inspector detected the protocol in your
  monitored network.|2|dvc=172.22.9.32 dvcmac=
  00:50:56:AD:03:BD
  dvchost=localhost deviceExternalId=E9A3FA433916-
  4738984C-A4BF-84A0-D603
  rt=Jun 22 2017 10:06:24 GMT+08:00 app=eDonkey
  deviceDirection=1 dhost=10.1.100.223 dst=10.1.100.223
  dpt=4662 dmac=00:0c:29:a7:72:74 shost=10.1.117.231
  src=10.1.117.231 spt=39933 smac=00:30:da:2d:47:32
  cn3Label=Threat Type cn3=6 sourceTranslatedAddress=
  10.1.117.231
  destinationTranslatedAddress=10.1.100.223 cnt=1
  flexNumber1Label=vLANId flexNumber1=4095
  devicePayloadId=6:11:P
CEF Web Reputation Logs
  Table 3-3. CEF Web Reputation Logs
           CEF Key                 Description                   Value
   Header (logVer)           CEF format version   CEF: 0
   Header (vendor)           Appliance vendor     Trend Micro
                                                                                        3-9
Trend Micro Deep Discovery Inspector Syslog Guide
                 CEF Key                        Description                         Value
       Header (pname)                   Appliance product          Deep Discovery Inspector
       Header (pver)                    Appliance version          Example: 3.8.1181
       Header (eventid)                 Signature ID               100101
       Header (eventName)               Description                Example: Dangerous URL in Web
                                                                   Reputation Services database -
                                                                   HTTP (Request)
       Header (severity)                Severity                   •    2: Informational
                                                                   •    4: Low
                                                                   •    6: Medium
                                                                   •    8: High
       app                              Protocol                   Example: HTTP
       c6a1                             Interested IPv6            Example: 2001:0:0:1::21
       c6a1Label                        Interested IPv6            InterestedIPv6
       c6a2                             Source IPv6 address        Example: 2001:0:0:1::21
       c6a2Label                        Source IPv6 address        Source IPv6 Address
       c6a3                             Destination IPv6 address   Example: 2001:0:0:1::21
       c6a3Label                        Destination IPv6 address   Destination IPv6 Address
       c6a4                             Peer IPv6 address          Example: 2001:0:0:1::21
       c6a4Label                        Peer IPv6 address          PeerIPv6
       cn1                              CCCA detection             0 or 1
       cn1Label                         CCCA detection             CCCA_Detection
       cn2                              Score                      Example: 49
       cn2Label                         Score                      WRSScore
       cn3                              Threat type                Example: 5
3-10
                                                             Syslog Content Mapping - CEF
           CEF Key               Description                  Value
cn3Label                   Threat type         Threat Type
cs1                        Mail subject        Example: hello
cs1Label                   Mail subject        MailSubject
cs2                        Category            Example: Gambling
cs2Label                   Category            URLCategory
cs3                        Host name           Example: CLIENT1
cs3Label                   Host name           HostName_Ext
cs4                        Attack Phase        •   Intelligence Gathering
                                               •   Point of Entry
                                               •   Command and Control
                                                   Communication
                                               •   Lateral Movement
                                               •   Asset and Data Discovery
                                               •   Data Exfiltration
                                               •   Nil (no applicable attack phase)
cs4Label                   Attack Phase        pAttackPhase
destinationTranslatedAdd   Peer IP             Example: 10.1.144.199
ress
deviceDirection            Packet direction    •   0: Source is external
                                               •   1: Source is internal
                                               •   2: Unknown
deviceExternalId           Appliance GUID      Example: 6B593E17AFB7-40FBBB28-
                                               A4CE-0462-A536
                                                                                   3-11
Trend Micro Deep Discovery Inspector Syslog Guide
                 CEF Key                       Description                         Value
       devicePayloadId                  An extendable field.       Examples:
                                        Format: {threat_type}:     •   With pcap file captured:
                                        {log_id}:{with pcap file       2:10245:P
                                        captured}{:extensions}*
                                                                   •   Without pcap file captured:
                                                                       2:10245:
       dhost                            Destination host name      Example: dhost1
       dmac                             Destination MAC            Example: 00:0C:29:6E:CB:F9
       dpt                              Destination port           Value between 0 and 65535
       dst                              Destination IP address     Example: 10.1.144.199
       duser                            Mail recipient             Example: duser1
       dvc                              Appliance IP address       Example: 10.1.144.199
       dvchost                          Appliance host name        Example: localhost
       dvcmac                           Appliance MAC address      Example: 00:0C:29:6E:CB:F9
       flexNumber1                      vLANId                     Example: 4095
       flexNumber1Label                 vLANId                     vLANId
       request                          URL                        Example: http://1.2.3.4/query?
                                                                   term=value
       requestClientApplication         User agent                 Example: IE
       rt                               Log generation time        Example: Mar 09 2015 17:05:21 GMT
                                                                   +08:00
       shost                            Source host name           Example: shost1
       smac                             Source MAC                 Example: 00:0C:29:6E:CB:F9
       sourceTranslatedAddress          Interested IP              Example: 10.1.144.199
       spt                              Source port                Value between 0 and 65535
       src                              Source IP address          Example: 10.1.144.199
3-12
                                                                Syslog Content Mapping - CEF
           CEF Key                  Description                  Value
   suser                       Mail sender          Example: suser1
  Log sample:
  CEF:0|Trend Micro|Deep Discovery Inspector
  |5.0.1329|100101|Ransomware
  URL in Web Reputation Services database - HTTP
  (Request)|8|dvc=172.22.9.32 dvcmac=00:50:56:AD:03:BD
  dvchost=localhost deviceExternalId=E9A3FA433916-4738984
  C-A4BF-84A0-D603
  rt=Jun 22 2017 10:00:17 GMT+08:00 cs3Label=HostName_Ext
  cs3=ca95-1.winshipway.com cn2Label=WRSScore cn2=49
  cn3Label=Threat Type cn3=5 dmac=00:16:c8:65:98:d5
  shost=172.22.9.5 src=172.22.9.5 spt=41757
  smac=00:50:56:82:e7:a9
  sourceTranslatedAddress=172.22.9.5
  cn1Label=CCCA_Detection
  cn1=1 request=http://ca95-1.winshipway.com/
  requestClientApplication=Wget/1.12
  (linux-gnu) app=HTTP deviceDirection=1
  dhost=150.70.162.115
  dst=150.70.162.115 dpt=80 cs2Label=URLCategory
  cs2=Ransomware destinationTranslatedAddress=
  150.70.162.115
  cs4Label=pAttackPhase cs4=Command and Control
  Communication flexNumber1Label=vLANId flexNumber1=4095
  request=http://ca95-1.winshipway.com/
  devicePayloadId=5:17:
CEF System Logs
  Table 3-4. CEF System Logs
           CEF Key                  Description                  Value
   Header (logVer)             CEF format version   CEF: 0
                                                                                      3-13
Trend Micro Deep Discovery Inspector Syslog Guide
                 CEF Key                       Description                      Value
       Header (vendor)                  Appliance vendor        Trend Micro
       Header (pname)                   Appliance product       Deep Discovery Inspector
       Header (pver)                    Appliance version       Example: 3.8.1181
       Header (eventid)                 Signature ID            •   300102
                                                                •   300999
       Header (eventName)               Description             Example: The system time setting
                                                                has been changed.
       Header (severity)                Severity                •   2: Informational
                                                                •   4: Warning
                                                                •   6: Severe
                                                                Example: 2
       c6a2                             Source IPv6 address     Example: 2001:0:0:1::21
       c6a2Label                        Source IPv6 address     Source IPv6 Address
       deviceExternalId                 Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                                A4CE-0462-A536
       duser                            Action by               Example: admin
       dvc                              Appliance IP address    Example: 10.1.144.199
       dvchost                          Appliance host name     Example: localhost
       dvcmac                           Appliance MAC address   Example: 00:0C:29:6E:CB:F9
       outcome                          Outcome                 •   Success
                                                                •   Failure
                                                                Example: Success
       rt                               Log generation time     Example: Mar 09 2015 17:05:21 GMT
                                                                +08:00
       src                              User IP address         Example: 10.1.1.1
3-14
                                                                 Syslog Content Mapping - CEF
  Log sample:
  CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1175|300999|T
  he system time setting has been changed.|2|dvc=10.201.156.14
  3 dvcmac=00:0C:29:A6:53:0C dvchost=ddi38-143 deviceExternalI
  d=6B593E17AFB7-40FBBB28-A4CE-0462-A536 rt=Mar 09 2015 16:46:
  08 GMT+08:00
CEF Virtual Analyzer Logs: File Analysis Events
  Table 3-5. CEF File Analysis Events
           CEF Key                  Description                       Value
   Header (logVer)            CEF format version   CEF: 0
   Header (vendor)            Appliance vendor     Trend Micro
   Header (pname)             Appliance product    Deep Discovery Inspector
   Header (pver)              Appliance version    Example: 3.8.1181
   Header (eventid)           Signature ID         200119
   Header (eventName)         Description          Sample file sandbox analysis is
                                                   finished.
   Header (severity)          Severity             3 (fixed value)
   cn1                        GRID is known good   •    0: Bad file
                                                   •    -1: Unknown file
                                                   •    1: Good file
   cn1Label                   GRID is known good   GRIDIsKnownGood
   cn2                        ROZ rating           •    0: No risk
                                                   •    1: Low risk
                                                   •    2: Medium risk
                                                   •    3: High risk
                                                                                       3-15
Trend Micro Deep Discovery Inspector Syslog Guide
                  CEF Key                      Description                      Value
       cn2Label                         ROZ rating              ROZRating
       cn3                              PcapReady               Example: 0
       cn3Label                         PcapReady               PcapReady
       cs1                              Sandbox image type      Example: win7
       cs1Label                         Sandbox image type      SandboxImageType
       cs2                              Virus name              Example: HEUR_NAMETRICK.A
       cs2Label                         Virus name              MalwareName
       cs3                              Parent SHA1             Example:
                                                                1EDD5B38DE4729545767088C5CAB
                                                                395E4197C8F3
       cs3Label                         Parent SHA1             ParentFileSHA1
       deviceExternalId                 Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                                A4CE-0462-A536
       dvc                              Appliance IP address    Example: 10.1.144.199
       dvchost                          Appliance host name     Example: localhost
       dvcmac                           Appliance MAC address   Example: 00:0C:29:6E:CB:F9
       fileHash                         SHA1                    Example:
                                                                1EDD5B38DE4729545767088C5CAB
                                                                395E4197C8F3
       fileType                         True file type          Example: WIN32 EXE
       fname                            File name               Example: excel.rar
       fsize                            File size               Example: 131372
       rt                               Analysis time           Example: Mar 09 2015 17:05:21 GMT
                                                                +08:00
       Log sample:
3-16
                                                                     Syslog Content Mapping - CEF
  CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200119|S
  ample file sandbox analysis is finished|3| rt=Mar 11 2015 06
  :51:46 GMT-04:00 dvc=10.201.156.143 dvchost=ddi38-143 dvcmac
  =00:0C:29:A6:53:0C deviceExternalId=D2C1D6D20FF8-4FC98F92-25
  EB-D7DA-AF0E fname=Tomb Raider.rar fileHash=1E4677A1EF1FBAD1
  1F8D06A9DAD8103C2CE861A9 fileType=RAR fsize=131372 cs1Label=
  SandboxImageType cs1=MAK_win7sp1en_offices_noab_TL cn2Label=
  ROZRating cn2=1 cn1Label=GRIDIsKnownGood cn1=-1 cs2Label=Mal
  wareName cs2=HEUR_NAMETRICK.A cn3Label=PcapReady cn3=0
CEF Virtual Analyzer Logs: Notable Characteristics
Events
  Table 3-6. CEF Notable Characteristics Events
              CEF Key              Description                           Value
   Header (logVer)           CEF format version        CEF: 0
   Header (vendor)           Appliance vendor          Trend Micro
   Header (pname)            Appliance product         Deep Discovery Inspector
   Header (pver)             Appliance version         Example: 3.8.1181
   Header (eventid)          Signature ID              200127
   Header (eventName)        Description               Notable Characteristics of the
                                                       analyzed sample
   Header (severity)         Severity                  6 (fixed value)
   cs1                       Violated policy name      Example: Suspicious network or
                                                       messaging activity
   cs1Label                  Violated policy name      PolicyCategory
   cs2                       Analysis violated event   Example: Uses spoofed version
                                                       information
   cs2Label                  Analysis violated event   PolicyName
                                                                                           3-17
Trend Micro Deep Discovery Inspector Syslog Guide
                  CEF Key                      Description                    Value
       deviceExternalId                 Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                                A4CE-0462-A536
       dvc                              Appliance IP address    Example: 10.1.144.199
       dvchost                          Appliance host name     Example: localhost
       dvcmac                           Appliance MAC address   Example: 00:0C:29:6E:CB:F9
       fileHash                         SHA1                    Example:
                                                                1EDD5B38DE4729545767088C5CAB
                                                                395E4197C8F3
       fileType                         True file type          Example: WIN32 EXE
       fname                            File name               Example: excel.rar
       fsize                            File size               Example: 131372
       msg                              Details                 Example: The file has no company
                                                                information.
       rt                               Analysis time           Example: Mar 09 2015 17:05:21 GMT
                                                                +08:00
       Log sample:
       CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200127|N
       otable Characteristics of the analyzed sample|6|rt=Mar 11 20
       15 05:00:26 GMT-04:00 dvc=10.201.156.143 dvchost=ddi38-143 d
       vcmac=00:0C:29:A6:53:0C deviceExternalId=D2C1D6D20FF8-4FC98F
       92-25EB-D7DA-AF0E fname=DTAS_WIN32_07 fileHash=672B1A8ADB412
       C272CCA21A214732C447B650349 fileType=WIN32 EXE fsize=290304
       cs1Label=PolicyCategory cs1=Deception, social engineering ms
       g=The file has no company information. cs2Label=PolicyName c
       s2=Uses spoofed version information
3-18
                                                                        Syslog Content Mapping - CEF
CEF Virtual Analyzer Logs: Deny List Transaction
Events
  Table 3-7. CEF Deny List Transaction Events
              CEF Key                Description                          Value
   Header (logVer)            CEF format version        CEF: 0
   Header (vendor)            Appliance vendor          Trend Micro
   Header (pname)             Appliance product         Deep Discovery Inspector
   Header (pver)              Appliance version         Example: 3.8.1181
   Header (eventid)           Signature ID              200120
   Header (eventName)         Description               Deny List updated
   Header (severity)          Severity                  3 (fixed value)
   act                        The action in the event   Add or Remove
   cs1                        Type                      •      Deny List IP/Port
                                                        •      Deny List URL
                                                        •      Deny List File SHA1
                                                        •      Deny List Domain
   cs1Label                   Type                      type
   cs2                        Risk level                •      Low
                                                        •      Medium
                                                        •      High
                                                        •      Confirmed malware
   cs2Label                   Risk level                RiskLevel
   deviceExternalId           Appliance GUID            Example: 6B593E17AFB7-40FBBB28-
                                                        A4CE-0462-A536
                                                                                              3-19
Trend Micro Deep Discovery Inspector Syslog Guide
                  CEF Key                      Description                     Value
       dhost                            Destination host name    Example: iplasticalsex.ru
       dpt                              Destination port         Value between 0 and 65535
       dst                              Destination IP address   Example: 10.1.144.199
       dvc                              Appliance IP address     Example: 10.1.144.199
       dvchost                          Appliance host name      Example: localhost
       dvcmac                           Appliance MAC address    Example: 00:0C:29:6E:CB:F9
       end                              Report end time          Example: Mar 09 2015 17:05:21 GMT
                                                                 +08:00
       fileHash                         SHA1                     Example:
                                                                 1EDD5B38DE4729545767088C5CAB
                                                                 395E4197C8F3
       request                          URL                      Example: http://1.2.3.4/query?
                                                                 term=value
       rt                               Analysis time            Example: Mar 09 2015 17:05:21 GMT
                                                                 +08:00
       Log sample:
       CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200120|D
       eny List updated|3|rt=Mar 11 2015 07:15:45 GMT-04:00 dvc=10.
       201.156.143 dvchost=ddi38-143 dvcmac=00:0C:29:A6:53:0C devic
       eExternalId=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF0E cs1Label=ty
       pe cs1=Deny List Domain end=Apr 10 2015 07:15:35 GMT-04:00 a
       ct=Add dhost=plasticalsex.ru cs2Label=RiskLevel cs2=Medium
3-20
                                                            Chapter 4
Syslog Content Mapping - LEEF
 The following tables outline syslog content mapping between Deep
 Discovery Inspector log output and LEEF syslog types:
 •   LEEF Threat Logs on page 4-2
 •   LEEF Disruptive Application Logs on page 4-9
 •   LEEF Web Reputation Logs on page 4-12
 •   LEEF System Logs on page 4-16
 •   LEEF Correlation Incident Logs on page 4-17
 •   LEEF Virtual Analyzer Logs: File Analysis Events on page 4-20
 •   LEEF Virtual Analyzer Logs: Notable Characteristics Events on page 4-22
      Note
      In LEEF log syntax, separate event attributes with a tab delimiter, <009>.
                                                                                   4-1
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF Threat Logs
      Table 4-1. LEEF Threat Logs
                LEEF Key                       Description                       Value
       Header (logVer)                  LEEF format version        LEEF: 1.0
       Header (vendor)                  Appliance vendor           Trend Micro
       Header (pname)                   Appliance product          Deep Discovery Inspector
       Header (pver)                    Appliance version          Example: 3.8.1181
       Header (eventName)               Event Name                 •    MALWARE_DETECTION
                                                                   •    MALWARE_OUTBREAK_DETECT
                                                                        ION
                                                                   •    SECURITY_RISK_DETECTION
       act                              The action in the event    blocked or not blocked
       aggregatedCnt                    Aggregated count           Example: 1
       aptRelated                       Indicates an APT-related   0 or 1
                                        event
       botCommand                       BOT command                Example: COMMIT
       botUrl                           BOT URL                    Example: trend.com
       cccaDestination                  CCCA address               Example: 10.1.144.199
       cccaDestinationFormat            CCCA type                  •    IP_DOMAIN
                                                                   •    IP_DOMAIN_PORT
                                                                   •    URL
                                                                   •    EMAIL
       cccaDetection                    CCCA detection             0 or 1
4-2
                                                                   Syslog Content Mapping - LEEF
       LEEF Key                  Description                         Value
cccaDetectionSource        CCCA log is detected by   •   GLOBAL_INTELLIGENCE
                                                     •   VIRTUAL_ANALYZER
                                                     •   USER_DEFINED
cccaRiskLevel              CCCA Risk Level           •   0: Unknown
                                                     •   1: Low
                                                     •   2: Medium
                                                     •   3: High
channelName                Channel name              Example: IRCChannel1
chatUserName               Nickname                  Example: IRCUser1
cnt                        Total count               Example: 1
compressedFileName         File name in archive      Example: mtxlegih.dll
detectionType              Detection type            •   0: Known detection
                                                     •   1: Unknown detection
                                                     •   2: OPS detection
deviceDirection            Packet direction          •   0: Source is external
                                                     •   1: Source is internal
                                                     •   2: Unknown
deviceGUID                 Appliance GUID            Example: 6B593E17AFB7-40FBBB28-
                                                     A4CE-0462-A536
deviceMacAddress           Appliance MAC address     Example: 00:0C:29:6E:CB:F9
deviceRiskConfidenceLeve   Confidence level          •   1: High
l
                                                     •   2: Medium
                                                     •   3: Low
                                                     •   0: Undefined
                                                                                            4-3
Trend Micro Deep Discovery Inspector Syslog Guide
                LEEF Key                       Description                     Value
      devTime                           Log generation time       Example: Mar 09 2015 17:05:21 GMT
                                                                  +08:00
      devTimeFormat                     Time format               MMM dd yyyy HH:mm:ss z
      dhost                             Destination host name     Example: dhost1
      dOSName                           Destination host OS       Example: Android
      dst                               Destination IP address    Example: 10.1.144.199
      dstGroup                          Network Group assigned    Example: monitor1
                                        to a destination host
      dstMAC                            Destination MAC           Example: 00:0C:29:6E:CB:F9
      dstPort                           Destination port          Value between 0 and 65535
      dstZone                           Destination zone          •   0: Not in monitored network
                                                                  •   1: In monitored network and
                                                                      trusted
                                                                  •   2: In monitored network and
                                                                      untrusted
      duser                             Mail recipient            Example: duser1
      dUser1                            Destination user name 1   Example: admin
      dUser1LoginTime                   Destination user log on   Example: Mar 09 2015 17:05:21 GMT
                                        time 1                    +08:00
      dUser2                            Destination user name 2   Example: admin
      dUser2LoginTime                   Destination user log on   Example: Mar 09 2015 17:05:21 GMT
                                        time 2                    +08:00
      dUser3                            Destination user name 3   Example: admin
      dUser3LoginTime                   Destination user log on   Example: Mar 09 2015 17:05:21 GMT
                                        time 3                    +08:00
      dvc                               Appliance IP address      Example: 10.1.144.199
4-4
                                                         Syslog Content Mapping - LEEF
           LEEF Key          Description                    Value
dvchost               Appliance host name    Example: localhost
evtCat                Event category         Example: Suspicious Traffic
evtSubCat             Event subcategory      Example: Email
fileHash              SHA1                   Example:1EDD5B38DE47295457670
                                             88C5CAB395E4197C8F3
filePath              File path              Example: SHARE\\
fileType              Real file type         Example: 1638400
fname                 File name              Example: excel.rar
fsize                 File size              Example: 131372
hackerGroup           Hacker group           Example: Comment Crew
hackingCampaign       Hacking campaign       Example:Aurora
hostName              Host name              Example: CLIENT1
interestedIp          Interested IP          Example: 10.1.144.199
mailMsgSubject        Mail subject           Example: hello
malFamily             Malware family         Example:Duqu
malName               Malware name           Example: HEUR_NAMETRICK.A
malType               Malware type           Example: MALWARE
mitigationTaskId      Event task ID for      Example:
                      mitigation             dc036acb-9a2e-4939-8244-
                                             dedbda9ec4ba
msg                   Description            Example: HEUR_NAMETRICK.A -
                                             SMTP (Email)
oldFileHash           Mail attachment SHA1   Example:
                                             1EDD5B38DE4729545767088C5CAB
                                             395E4197C8F3
                                                                                  4-5
Trend Micro Deep Discovery Inspector Syslog Guide
                LEEF Key                       Description                          Value
      oldFileName                       Mail attachment file name   Example: excel.rar
      oldFileSize                       Mail attachment file size   Example: 150000
      oldFileType                       Mail attachment file type   Example: 1638400
      pAttackPhase                      Primary attack phase        •     Intelligence Gathering
                                                                    •     Point of Entry
                                                                    •     Command and Control
                                                                          Communication
                                                                    •     Lateral Movement
                                                                    •     Asset and Data Discovery
                                                                    •     Data Exfiltration
                                                                    •     Nil (no applicable attack phase)
      pComp                             Detection engine/           Example: VSAPI
                                        component
      peerIP                            Peer IP                     Example: 10.1.144.199
      proto                             Protocol                    Example: SMTP
      protoGroup                        Protocol group              Example: SMTP
      ptype                             Application type            IDS
      requestClientApplication          User agent                  Example: IE
      riskType                          Potential risk              •     0: Known risk
                                                                    •     1: Potential risk
      ruleId                            Rule ID                     Example: 52
      sAttackPhase                      Secondary attack phase      Example: Point of Entry
4-6
                                                               Syslog Content Mapping - LEEF
          LEEF Key         Description                           Value
sev                  Severity                    •   2: Informational
                                                 •   4: Low
                                                 •   6: Medium
                                                 •   8: High
shost                Source host name            Example: shost1
sOSName              Source host OS              Example: Android
src                  Source IP address           Example: 10.1.144.199
srcGroup             Network Group assigned      Example: monitor1
                     to a source host
srcMAC               Source MAC                  Example: 00:0C:29:6E:CB:F9
srcPort              Source port                 Value between 0 and 65535
srcZone              Source zone                 •   0: Not in monitored network
                                                 •   1: In monitored network and
                                                     trusted
                                                 •   2: In monitored network and
                                                     untrusted
suid                 User name                   Example: User1
suser                Mail sender                 Example: suser1
sUser1               Source user name 1          Example: admin
sUser1LoginTime      Source user log on time 1   Example: Mar 09 2015 17:05:21 GMT
                                                 +08:00
sUser2               Source user name 2          Example: admin
sUser2LoginTime      Source user log on time 2   Example: Mar 09 2015 17:05:21 GMT
                                                 +08:00
sUser3               Source user name 3          Example: admin
                                                                                        4-7
Trend Micro Deep Discovery Inspector Syslog Guide
                LEEF Key                       Description                           Value
      sUser3LoginTime                   Source user log on time 3   Example: Mar 09 2015 17:05:21 GMT
                                                                    +08:00
      threatType                        Threat type                 •   0: Malicious content
                                                                    •   1: Malicious behavior
                                                                    •   2: Suspicious behavior
                                                                    •   3: Exploit
                                                                    •   4: Grayware
      url                               URL                         Example: http://1.2.3.4/query?
                                                                    term=value
      vLANId                            VLANID                      Value between 0 and 4095
      Log sample:
             Note
             When using the LEEF log syntax, separate event attributes with <009> as a tab
             delimiter.
      LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1175|SECUR
      ITY_RISK_DETECTION|devTimeFormat=MMM dd yyyy HH:mm:ss z<009>
      ptype=IDS<009>dvc=10.201.156.143<009>deviceMacAddress=00:0C:
      29:A6:53:0C<009>dvchost=ddi38-143<009>deviceGUID=6B593E17AFB
      7-40FBBB28-A4CE-0462-A536<009>devTime=Mar 09 2015 11:58:24 G
      MT+08:00<009>sev=6<009>protoGroup=HTTP<009>proto=HTTP<009>vL
      ANId=4095<009>deviceDirection=1<009>dhost=www.freewebs.com<0
      09>dst=216.52.115.2<009>dstPort=80<009>dstMAC=00:1b:21:35:8b
      :98<009>shost=172.16.1.197<009>src=172.16.1.197<009>srcPort=
      12121<009>srcMAC=fe:ed:be:ef:5a:c6<009>malType=MALWARE<009>s
      AttackPhase=Point of Entry<009>fname=setting.doc<009>fileTyp
      e=0<009>fsize=0<009>ruleId=20<009>msg=HEUR_NAMETRIC
      K.A - SMTP (Email)<009>deviceRiskConfidenceLevel=2
      <009>url=http://www.freewebs.com/setting3/setting.doc
      <009>pComp=CAV<009>riskType=1<009>
      srcGroup=Default<009>srcZone=1<009>dstZone=0<009>dete
      ctionType=1<009>act=not blocked<009>threatType=1<009>interes
4-8
                                                                    Syslog Content Mapping - LEEF
  tedIp=172.16.1.197<009>peerIp=216.52.115.2<009>hostName=www.
  freewebs.com<009>cnt=1<009>aggregatedCnt=1<009>cccaDestinati
  onFormat=URL<009>cccaDetectionSource=GLOBAL_INTELLIGENCE<009
  >cccaRiskLevel=2<009>cccaDestination=http://www.freewebs.com
  /setting3/setting.doc<009>cccaDetection=1<009>evtCat=Callbac
  k evtSubCat=Bot<009>pAttackPhase=Command and Control Communi
  cation
LEEF Disruptive Application Logs
  Table 4-2. LEEF Disruptive Application Logs
           LEEF Key                 Description                       Value
   Header (logVer)            LEEF format version     LEEF: 1.0
   Header (vendor)            Appliance vendor        Trend Micro
   Header (pname)             Appliance product       Deep Discovery Inspector
   Header (pver)              Appliance version       Example: 3.8.1181
   Header (eventName)         Event Name              DISRUPTIVE_APPLICATION_DETECT
                                                      ION
   aggregatedCnt              AggrCount               Example: 1
   cnt                        Total count             Example: 1
   deviceDirection            Packet direction        •   0: Source is external
                                                      •   1: Source is internal
                                                      •   2: Unknown
   deviceGUID                 Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                      A4CE-0462-A536
   deviceMacAddress           Appliance MAC address   Example: 00:0C:29:6E:CB:F9
   devTime                    Log generation time     Example: Mar 09 2015 17:05:21 GMT
                                                      +08:00
                                                                                             4-9
Trend Micro Deep Discovery Inspector Syslog Guide
                 LEEF Key                      Description                      Value
       devTimeFormat                    Time format              MMM dd yyyy HH:mm:ss z
       dhost                            Destination host name    Example: dhost1
       dOSName                          Destination host OS      Example: Android
       dst                              Destination IP address   Example: 10.1.144.199
       dstGroup                         Network Group assigned   Example: monitor1
                                        to a destination host
       dstMAC                           Destination MAC          Example: 00:0C:29:6E:CB:F9
       dstPort                          Destination port         Value between 0 and 65535
       dstZone                          Destination zone         •     0: Not in monitored network
                                                                 •     1: In monitored network and
                                                                       trusted
                                                                 •     2: In monitored network and
                                                                       not trusted
       dvc                              Appliance IP address     Example: 10.1.144.199
       dvchost                          Appliance host name      Example: localhost
       interestedIp                     Interested IP            Example: 10.1.144.199
       msg                              Description              Example: Deep Discovery Inspector
                                                                 detected the protocol in your
                                                                 monitored network
       pComp                            Detection engine/        Example: VSAPI
                                        component
       peerIP                           Peer IP                  Example: 10.1.144.199
       proto                            Protocol                 Example: SMTP
       protoGroup                       Protocol group           Example: SMTP
       ptype                            Application type         IDS
4-10
                                                                    Syslog Content Mapping - LEEF
          LEEF Key                Description                         Value
sev                         Severity                  •   2: Informational
                                                      •   4: Low
                                                      •   6: Medium
                                                      •   8: High
shost                       Source host name          Example: shost1
sOSName                     Source host OS            Example: Android
src                         Source IP address         Example: 10.1.144.199
srcGroup                    Network Group assigned    Example: monitor1
                            to a source host
srcMAC                      Source MAC                Example: 00:0C:29:6E:CB:F9
srcPort                     Source port               Value between 0 and 65535
srcZone                     Source zone               •   0: Not in monitored network
                                                      •   1: In monitored network and
                                                          trusted
                                                      •   2: In monitored network and
                                                          not trusted
threatType                  Threat type               6
vLANId                      VLANID                    Value between 0 and 4095
Log sample:
        Note
        When using the LEEF log syntax, separate event attributes with <009> as a tab
        delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1175|DISRU
PTIVE_APPLICATION_DETECTION|devTimeFormat=MMM dd yyyy HH:mm:
ss z<009>dvc=10.201.156.143<009>deviceMacAddress=00:0C:29:A6
:53:0C<009>dvchost=ddi38-143<009>deviceGUID=6B593E17AFB7-40F
                                                                                           4-11
Trend Micro Deep Discovery Inspector Syslog Guide
       BBB28-A4CE-0462-A536<009>ptype=IDS<009>devTime=Mar 09 2015 1
       4:20:38 GMT+08:00<009>sev=2<009>protoGroup=STREAMING<009>pro
       to=WMSP<009>vLANId=4095<009>deviceDirection=1<009>dhost=12.1
       90.48.13<009>dst=12.190.48.13<009>dstPort=80<009>dstMAC=00:1
       7:9a:65:f3:05<009>shost=192.168.33.2<009>src=192.168.33.2<00
       9>srcPort=35125<009>srcMAC=00:16:6f:a1:3d:7a<009>msg=Deep Di
       scovery Inspector detected the protocol in your monitored ne
       twork.<009>pComp=CAV<009>threatType=6<009>srcGroup=Default<0
       09>srcZone=1<009>dstZone=0<009>interestedIp=192.168.33.2<009
       >peerIp=12.190.48.13<009>cnt=1<009>aggregatedCnt=1
LEEF Web Reputation Logs
       Table 4-3. LEEF Web Reputation Logs
                LEEF Key                       Description                       Value
        Header (logVer)                 LEEF format version       LEEF: 1.0
        Header (vendor)                 Appliance vendor          Trend Micro
        Header (pname)                  Appliance product         Deep Discovery Inspector
        Header (pver)                   Appliance version         Example: 3.8.1181
        Header (eventName)              Event Name                WEB_THREAT_DETECTION
        cccaDetection                   CCCA detection            0 or 1
        cccaDetectionSource             CCCA log is detected by   •    GLOBAL_INTELLIGENCE
                                                                  •    VIRTUAL_ANALYZER
                                                                  •    USER_DEFINED
        cccaRiskLevel                   CCCA Risk Level           •    0: Unknown
                                                                  •    1: Low
                                                                  •    2: Medium
                                                                  •    3: High
4-12
                                                         Syslog Content Mapping - LEEF
          LEEF Key         Description                      Value
deviceDirection      Packet direction         •   0: Source is external
                                              •   1: Source is internal
                                              •   2: Unknown
deviceGUID           Appliance GUID           Example: 6B593E17AFB7-40FBBB28-
                                              A4CE-0462-A536
deviceMacAddress     Appliance MAC address    Example: 00:0C:29:6E:CB:F9
devTime              Log generation time      Example: Mar 09 2015 17:05:21 GMT
                                              +08:00
devTimeFormat        Time format              MMM dd yyyy HH:mm:ss z
dhost                Destination host name    Example: dhost1
dOSName              Destination host OS      Example: Android
dst                  Destination IP address   Example: 10.1.144.199
dstGroup             Network Group assigned   Example: monitor1
                     to a destination host
dstMAC               Destination MAC          Example: 00:0C:29:6E:CB:F9
dstPort              Destination port         Value between 0 and 65535
dstZone              Destination zone         •   0: Not in monitored network
                                              •   1: In monitored network and
                                                  trusted
                                              •   2: In monitored network and
                                                  not trusted
duser                Mail recipient           Example: duser1
dvc                  Appliance IP address     Example: 10.1.144.199
dvchost              Appliance host name      Example: localhost
hostName             Host name                Example: CLIENT1
                                                                                4-13
Trend Micro Deep Discovery Inspector Syslog Guide
                 LEEF Key                       Description                      Value
       interestedIp                     Interested IP            Example: 10.1.144.199
       mailMsgSubject                   Mail subject             Example: hello
       msg                              Description              Example: Dangerous URL in Web
                                                                 Reputation Services database -
                                                                 HTTP (Request)
       pComp                            Detection engine/        Example: VSAPI
                                        component
       peerIP                           Peer IP                  Example: 10.1.144.199
       proto                            Protocol                 Example: SMTP
       protoGroup                       Protocol group           Example: SMTP
       ptype                            Application type         IDS
       requestClientApplication         User agent               Example: IE
       riskScore                        Score                    Example: 49
       sev                              Severity                 •     2: Informational
                                                                 •     4: Low
                                                                 •     6: Medium
                                                                 •     8: High
       shost                            Source host name         Example: shost1
       sOSName                          Source host OS           Example: Android
       src                              Source IP address        Example: 10.1.144.199
       srcGroup                         Network Group assigned   Example: monitor1
                                        to a source host
       srcMAC                           Source MAC               Example: 00:0C:29:6E:CB:F9
       srcPort                          Source port              Value between 0 and 65535
4-14
                                                                 Syslog Content Mapping - LEEF
          LEEF Key                Description                       Value
srcZone                     Source zone               •   0: Not in monitored network
                                                      •   1: In monitored network and
                                                          trusted
                                                      •   2: In monitored network and
                                                          not trusted
suser                       Mail sender               Example: suser1
threatType                  Threat type               5
url                         URL                       Example: http://1.2.3.4/query?
                                                      term=value
urlCat                      Category                  Example: Gambling
vLANId                      VLANID                    Value between 0 and 4095
Log sample:
        Note
        When using the LEEF log syntax, separate event attributes with <009> as a tab
        delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1175|WEB_T
HREAT_DETECTION|devTimeFormat=MMM dd yyyy HH:mm:ss z<009>dvc
=10.201.156.143<009>deviceMacAddress=00:0C:29:A6:53:0C<009>d
vchost=ddi38-143<009>deviceGUID=6B593E17AFB7-40FBBB28-A4CE-0
462-A536<009>ptype=IDS<009>devTime=Mar 09 2015 14:06:36 GMT+
08:00<009>sev=6<009>protoGroup=HTTP<009>proto=HTTP<009>vLANI
d=4095<009>deviceDirection=1<009>dhost=www.freewebs.com<009>
dst=216.52.115.2<009>dstPort=80<009>dstMAC=00:1b:21:35:8b:98
<009>shost=172.16.1.197<009>src=172.16.1.197<009>srcPort=121
21<009>srcMAC=fe:ed:be:ef:5a:c6<009>hostName=www.freewebs.co
m<009>msg=Dangerous URL in Web Reputation Services
database - HTTP (Request)<009>url=http:
//www.freewebs.com/setting3/setting.doc<009>
pComp=TMUFE<009>srcGroup=Default<009>
srcZone=1<009>dstZone=0<009>urlCat=
                                                                                        4-15
Trend Micro Deep Discovery Inspector Syslog Guide
       Disease Vector<009>riskScore=49<009>threatTy
       pe=5<009>interestedIp=172.16.1.197<009>
       peerIp=216.52.115.2
LEEF System Logs
       Table 4-4. LEEF System Logs
                  LEEF Key                     Description                    Value
        Header (logVer)                 LEEF format version     LEEF: 1.0
        Header (vendor)                 Appliance vendor        Trend Micro
        Header (pname)                  Appliance product       Deep Discovery Inspector
        Header (pver)                   Appliance version       Example: 3.8.1181
        Header (eventName)              Event Name              •     PRODUCT_UPDATE
                                                                •     SYSTEM_EVENT
        deviceGUID                      Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                                A4CE-0462-A536
        deviceMacAddress                Appliance MAC address   Example: 00:0C:29:6E:CB:F9
        devTime                         Log generation time     Example: Mar 09 2015 17:05:21 GMT
                                                                +08:00
        devTimeFormat                   Time format             MMM dd yyyy HH:mm:ss z
        dvc                             Appliance IP address    Example: 10.1.144.199
        dvchost                         Appliance host name     Example: localhost
        msg                             Description             Example: The system time setting
                                                                has been changed.
        ptype                           Application type        IDS
4-16
                                                                     Syslog Content Mapping - LEEF
           LEEF Key                 Description                        Value
   sev                        Severity                 •   2: Informational
                                                       •   4: Warning
                                                       •   6: Severe
                                                       Example: 2
  Log sample:
         Note
         When using the LEEF log syntax, separate event attributes with <009> as a tab
         delimiter.
  LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1175|SYSTE
  M_EVENT|dvc=10.201.156.143<009>deviceMacAddress=00:0C:29:A6:
  53:0C<009>dvchost=ddi38-143<009>deviceGUID=6B593E17AFB7-40FB
  BB28-A4CE-0462-A536<009>ptype=IDS<009>devTimeFormat=MMM dd y
  yyy HH:mm:ss z<009>sev=2<009>msg=The system time setting has
   been changed.<009>devTime=Mar 09 2015 16:46:08 GMT+08:00
LEEF Correlation Incident Logs
  Table 4-5. LEEF Correlation Incident Logs
           LEEF Key                 Description                        Value
   Header (logVer)            LEEF format version      LEEF: 1.0
   Header (vendor)            Appliance vendor         Trend Micro
   Header (pname)             Appliance product        Deep Discovery Inspector
   Header (pver)              Appliance version        Example: 3.8.1181
   Header (eventName)         Event Name               SUSPICIOUS_BEHAVIOUR_DETECTI
                                                       ON
                                                                                            4-17
Trend Micro Deep Discovery Inspector Syslog Guide
                 LEEF Key                      Description                     Value
       data0                            Correlation data 0       Additional attribute values
       data1                            Correlation data 1       Additional attribute values
       data2                            Correlation data 2       Additional attribute values
       data3                            Correlation data 3       Additional attribute values
       data4                            Correlation data 4       Additional attribute values
       data5                            Correlation data 5       Additional attribute values
       data6                            Correlation data 6       Additional attribute values
       data7                            Correlation data 7       Additional attribute values
       data8                            Correlation data 8       Additional attribute values
       data9                            Correlation data 9       Additional attribute values
       deviceDirection                  Packet direction         •   0: Source is external
                                                                 •   1: Source is internal
                                                                 •   2: Unknown
       deviceGUID                       Appliance GUID           Example: 6B593E17AFB7-40FBBB28-
                                                                 A4CE-0462-A536
       deviceMacAddress                 Appliance MAC address    Example: 00:0C:29:6E:CB:F9
       devTime                          Log generation time      Example: Mar 09 2015 17:05:21 GMT
                                                                 +08:00
       devTimeFormat                    Time format              MMM dd yyyy HH:mm:ss z
       dvc                              Appliance IP address     Example: 10.1.144.199
       dvchost                          Appliance host name      Example: localhost
       interestedHost                   Interested host name     Example: trend.net
       interestedIp                     Interested IP            Example: 10.1.144.199
       interestedMacAddress             Interested MAC address   Example: 00:0C:29:6E:CB:F9
4-18
                                                                      Syslog Content Mapping - LEEF
          LEEF Key                Description                           Value
interestedUser              Interested user name 1    Example: user1
interestedUser2             Interested user name 2    Example: user2
interestedUser3             Interested user name 3    Example: user3
pComp                       Detection engine/         Correlation
                            component
proto                       Protocol                  Example: SMTP
ptype                       Application type          IDS
ruleId                      Rule ID                   Example: 52
ruleName                    Rule name                 Example: This host has responded
                                                      to DNS queries.
sev                         Severity                  •     2: Informational
                                                      •     4: Low
                                                      •     6: Medium
                                                      •     8: High
threatName                  Threat name               Example: Malicious Bot
threatType                  Threat type               Example: Malware-related
userGroup                   User group                Example: Default
Log sample:
        Note
        When using the LEEF log syntax, separate event attributes with <009> as a tab
        delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|SUSPI
CIOUS_BEHAVIOUR_DETECTION|devTimeFormat=MMM dd yyyy HH:mm:ss
 z<009>deviceMacAddress=00:0C:29:A6:53:0C<009>dvchost=ddi38-
143<009>pComp=Correlation<009>dvc=10.201.156.143<009>ptype=I
                                                                                             4-19
Trend Micro Deep Discovery Inspector Syslog Guide
       DS<009>deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF0E<009>d
       evTime=Mar 11 2015 22:05:50 GMT-04:00<009>sev=2<009>interest
       edIp=172.16.0.100<009>interestedHost=172.16.0.100<009>intere
       stedMacAddress=00:0c:29:70:45:...36<009>ruleId=47<009>ruleNa
       me=This host has responded to DNS queries.<009>threatType=Un
       registered Service<009>threatName=Unregistered DNS Server<00
       9>proto=DNS Response<009>userGroup=Default<009>deviceDirecti
       on=1
LEEF Virtual Analyzer Logs: File Analysis Events
       Table 4-6. LEEF File Analysis Events
                LEEF Key                       Description                    Value
        Header (logVer)                 LEEF format version     LEEF: 1.0
        Header (vendor)                 Appliance vendor        Trend Micro
        Header (pname)                  Appliance product       Deep Discovery Inspector
        Header (pver)                   Appliance version       Example: 3.8.1181
        Header (eventName)              Event Name              FILE_ANALYZED
        deviceGUID                      Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                                A4CE-0462-A536
        deviceMacAddress                Appliance MAC address   Example: 00:0C:29:6E:CB:F9
        deviceOSName                    Sandbox image type      SandboxImageType
        deviceProcessHash               Parent SHA1             Example:
                                                                1EDD5B38DE4729545767088C5CAB
                                                                395E4197C8F3
        devTime                         Analysis time           Example: Mar 09 2015 17:05:21 GMT
                                                                +08:00
        devTimeFormat                   Time format             MMM dd yyyy HH:mm:ss z
        dvc                             Appliance IP address    Example: 10.1.144.199
4-20
                                                                   Syslog Content Mapping - LEEF
           LEEF Key                Description                           Value
dvchost                     Appliance host name       Example: localhost
fileHash                    File SHA1                 Example:
                                                      1EDD5B38DE4729545767088C5CAB
                                                      395E4197C8F3
fileType                    True file type            Example: WIN32 EXE
fname                       File name                 Example: excel.rar
fsize                       File size                 Example: 131372
gridIsKnownGood             GRID is known good        •    0: Bad file
                                                      •    -1: Unknown file
                                                      •    1: Good file
malName                     Virus name                Example: HEUR_NAMETRICK.A
pcapReady                   PCAP ready                Example: 1
pComp                       Detection source          •    Sandbox
                                                      •    UDSO (User-Defined Suspicious
                                                           Objects)
rozRating                   ROZ rating                •    0: No risk
                                                      •    1: Low risk
                                                      •    2: Medium risk
                                                      •    3: High risk
sev                         Severity                  3 (fixed value)
Log sample:
        Note
        When using the LEEF log syntax, separate event attributes with <009> as a tab
        delimiter.
                                                                                          4-21
Trend Micro Deep Discovery Inspector Syslog Guide
       LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|FILE_
       ANALYZED|devTime=Mar 11 2015 07:36:27 GMT-04:00<009>devTimeF
       ormat=MMM dd yyyy HH:mm:ss z<009>sev=3<009>pComp=Sandbox<009
       >dvc=10.201.156.143<009>dvchost=ddi38-143<009>deviceMacAddre
       ss=00:0C:29:A6:53:0C<009>deviceGUID=D2C1D6D20FF8-4FC98F92-25
       EB-D7DA-AF0E<009>fname=mwsoemon.exe<009>fileHash=89DE67C5220
       91EE259533D9CBDDF37DDB8C8D636<009>malName=Possible_Virus<009
       >fileType=WIN32 EXE<009>fsize=59392<009>deviceOSName=MAK_win
       7sp1en_offices_noab_TL<009>gridIsKnownGood=-1<009>rozRating=
       1<009>pcapReady=1
LEEF Virtual Analyzer Logs: Notable Characteristics
Events
       Table 4-7. LEEF Notable Characteristics Events
                LEEF Key                       Description                      Value
        Header (logVer)                 LEEF format version     LEEF: 1.0
        Header (vendor)                 Appliance vendor        Trend Micro
        Header (pname)                  Appliance product       Deep Discovery Inspector
        Header (pver)                   Appliance version       Example: 3.8.1181
        Header (eventName)              Event Name              NOTABLE_CHARACTERISTICS
        deviceGUID                      Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                                A4CE-0462-A536
        deviceMacAddress                Appliance MAC address   Example: 00:0C:29:6E:CB:F9
        deviceOSName                    Sandbox image type      Example: win7
        devTime                         Analysis time           Example: Mar 09 2015 17:05:21 GMT
                                                                +08:00
        devTimeFormat                   Time format             MMM dd yyyy HH:mm:ss z
        dvc                             Appliance IP address    Example: 10.1.144.199
4-22
                                                                   Syslog Content Mapping - LEEF
           LEEF Key                Description                          Value
dvchost                     Appliance host name       Example: localhost
fileHash                    File SHA1                 Example:
                                                      1EDD5B38DE4729545767088C5CAB
                                                      395E4197C8F3
fileType                    True file type            Example: WIN32 EXE
fname                       File name                 Example: excel.rar
fsize                       File size                 Example: 131372
msg                         Details                   Example:
                                                      www.chapisteriadaniel.com
pComp                       Detection source          Sandbox
ruleCategory                Violated policy name      Example: Internet Explorer Setting
                                                      Modification
ruleName                    Analysis violated event   Example: Modified important
                                                      registry items
sev                         Severity                  6 (fixed value)
Log sample:
        Note
        When using the LEEF log syntax, separate event attributes with <009> as a tab
        delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|NOTAB
LE_CHARACTERISTICS|devTime=Mar 11 2015 05:00:26 GMT-04:00<00
9>devTimeFormat=MMM dd yyyy HH:mm:ss z<009>sev=6<009>pComp=S
andbox<009>dvc=10.201.156.143<009>dvchost=ddi38-143<009>devi
ceMacAddress=00:0C:29:A6:53:0C<009>deviceGUID=D2C1D6D20FF8-4
FC98F92-25EB-D7DA-AF0E<009>fname=DTAS_WIN32_07<009>fileHash=
672B1A8ADB412C272CCA21A214732C447B650349<009>fileType=WIN32
EXE<009>fsize=290304<009>ruleCategory=Suspicious network or
messaging activity<009>ruleName=Queries DNS server<009>msg=0
                                                                                          4-23
Trend Micro Deep Discovery Inspector Syslog Guide
       12webpages.com<009>deviceOSName=MAK_win7sp1en_offices_noab_T
       L
LEEF Virtual Analyzer Logs: Deny List Transaction
Event
       Table 4-8. LEEF Deny List Transaction Events
                LEEF Key                       Description                      Value
        Header (logVer)                 LEEF format version       LEEF: 1.0
        Header (vendor)                 Appliance vendor          Trend Micro
        Header (pname)                  Appliance product         Deep Discovery Inspector
        Header (pver)                   Appliance version         Example: 3.8.1181
        Header (eventName)              Event Name                DENYLIST_CHANGE
        act                             The action in the event   •   Add
                                                                  •   Remove
        deviceExternalRiskType          Risk level                •   Low
                                                                  •   Medium
                                                                  •   High
                                                                  •   Confirmed malware
        deviceGUID                      Appliance GUID            Example: 6B593E17AFB7-40FBBB28-
                                                                  A4CE-0462-A536
        deviceMacAddress                Appliance MAC address     Example: 00:0C:29:6E:CB:F9
        devTime                         Analysis time             Example: Mar 09 2015 17:05:21 GMT
                                                                  +08:00
        devTimeFormat                   Time format               MMM dd yyyy HH:mm:ss z
        dhost                           Destination host name     Example: insta-find.com
4-24
                                                                  Syslog Content Mapping - LEEF
           LEEF Key              Description                           Value
dpt                        Remote port               Value between 0 and 65535
dst                        Remote IP                 Example: 10.1.144.199
dvc                        Appliance IP address      Example: 10.1.144.199
dvchost                    Appliance host name       Example: localhost
end                        Report end time           Example: Mar 09 2015 17:05:21 GMT
                                                     +08:00
fileHash                   File SHA1                 Example:
                                                     1EDD5B38DE4729545767088C5CAB
                                                     395E4197C8F3
pComp                      Detection source          Sandbox
sev                        Severity                  3 (fixed value)
type                       Deny List type            •    Deny List IP/Port
                                                     •    Deny List URL
                                                     •    Deny List File SHA1
                                                     •    Deny List Domain
url                        URL                       Example: http://1.2.3.4/
Log sample:
       Note
       When using the LEEF log syntax, separate event attributes with <009> as a tab
       delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|DENYL
IST_CHANGE|devTime=Mar 11 2015 05:00:42 GMT-04:00<009>devTim
eFormat=MMM dd yyyy HH:mm:ss z<009>sev=3<009>pComp=Sandbox<0
09>dvc=10.201.156.143<009>dvchost=ddi38-143<009>deviceMacAdd
ress=00:0C:29:A6:53:0C<009>deviceGUID=D2C1D6D20FF8-4FC98F92-
25EB-D7DA-AF0E<009>end=Apr 10 2015 05:00:26 GMT-04:00<009>ac
                                                                                         4-25
Trend Micro Deep Discovery Inspector Syslog Guide
       t=Add<009>dhost=ourdatatransfers.com<009>deviceExternalRiskT
       ype=High<009>type=Deny List Domain
4-26
                                                       Chapter 5
Syslog Content Mapping - TMEF
 The following tables outline syslog content mapping between Deep
 Discovery Inspector log output and TMEF syslog types:
 •   TMEF Threat Logs on page 5-2
 •   TMEF Disruptive Application Logs on page 5-11
 •   TMEF Web Reputation Logs on page 5-15
 •   TMEF System Logs on page 5-20
 •   TMEF Correlated Incident Logs on page 5-22
 •   TMEF Virtual Analyzer Logs: File Analysis Events on page 5-24
 •   TMEF Virtual Analyzer Logs: Notable Characteristics Events on page 5-26
 •   TMEF Virtual Analyzer Logs: Deny List Transaction Events on page 5-28
                                                                               5-1
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Threat Logs
      Table 5-1. TMEF Threat Logs
                TMEF Key                       Description                      Value
       Header (logVer)                  TMEF format version       CEF: 0
       Header (vendor)                  Appliance vendor          Trend Micro
       Header (pname)                   Appliance product         Deep Discovery Inspector
       Header (pver)                    Appliance version         Example: 3.8.1181
       Header (eventid)                 Event ID                  •   100100
                                                                  •   100118
                                                                  •   100119
       Header (eventName)               Event Name                •   MALWARE_DETECTION
                                                                  •   MALWARE_OUTBREAK_DETECT
                                                                      ION
                                                                  •   SECURITY_RISK_DETECTION
       Header (severity)                Severity                  •   2: Informational
                                                                  •   4: Low
                                                                  •   6: Medium
                                                                  •   8: High
       act                              The action in the event   blocked or not blocked
       app                              Protocol                  Example: HTTP
       appGroup                         Protocol group            Example: HTTP
       compressedFileHash               Compressed file SHA1      Example:
                                                                  1EDD5B38DE4729545767088C5CAB
                                                                  395E4197C8F3
       compressedFileName               File name in archive      Example: mtxlegih.dll
5-2
                                                              Syslog Content Mapping - TMEF
       TMEF Key            Description                            Value
compressedFileType   Compressed file type       Example: 0
cnt                  Total count                Example: 1
cn1                  CCCA detection             0 or 1
cn1Label             CCCA detection             CCCA_Detection
cn2                  Indicates an APT-related   0 or 1
                     event
cn2Label             Indicates an APT-related   APT Related
                     event
cn3                  Potential risk             •    0: Known risk
                                                •    1: Potential risk
cn3Label             Potential risk             Deep Discovery_PotentialRisk
cn4                  Threat type                •    0: Malicious content
                                                •    1: Malicious behavior
                                                •    2: Suspicious behavior
                                                •    3: Exploit
                                                •    4: Grayware
cn4Label             Threat type                Deep Discovery_ThreatType
cn5                  Aggregated count           Example: 1
cn5Label             Aggregated count           AggregatedCnt
cn6                  CCCA Risk Level            •    0: Unknown
                                                •    1: Low
                                                •    2: Medium
                                                •    3: High
cn6Label             CCCA Risk Level            CCCA_RiskLevel
                                                                                       5-3
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                     Value
      cn7                               Heuristic flag           •   0: Non-heuristic detection
                                                                 •   1: Heuristic detection
      cn7Label                          Heuristic flag           HeurFlag
      cs1                               Channel name             Example: IRCChannel1
      cs1Label                          Channel name             IRCChannelName
      cs2                               Nickname                 Example: IRCUser1
      cs2Label                          Nickname                 IRCUserName
      cs3                               Host name                Example: CLIENT1
      cs3Label                          Host name                HostName_Ext
      cs4                               Network Group assigned   Example: monitor1
                                        to a source host
      cs4Label                          Network Group assigned   Deep Discovery_SrcGroup
                                        to a source host
      cs5                               Source zone              •   0: Not in monitored network
                                                                 •   1: In monitored network and
                                                                     trusted
                                                                 •   2: In monitored network and
                                                                     untrusted
      cs5Label                          Source zone              Deep Discovery_SrcZone
      cs6                               Detection type           •   0: Known detection
                                                                 •   1: Unknown detection
                                                                 •   2: OPS detection
      cs6Label                          Detection type           Deep Discovery_DetectionType
      cs7                               BOT command              Example: COMMIT
      cs7Label                          BOT command              BOT_CMD
5-4
                                                        Syslog Content Mapping - TMEF
       TMEF Key         Description                        Value
cs8               BOT url                   Example: trend.com
cs8Label          BOT url                   BOT_URL
cs9               Network Group assigned    Example: monitor1
                  to a destination host
cs9Label          Network Group assigned    Deep Discovery_DstGroup
                  to a destination host
cs10              Destination zone          •   0: Not in monitored network
                                            •   1: In monitored network and
                                                trusted
                                            •   2: In monitored network and
                                                untrusted
cs10Label         Destination zone          Deep Discovery_DstZone
cs11              CCCA log is detected by   •   GLOBAL_INTELLIGENCE
                                            •   VIRTUAL_ANALYZER
                                            •   USER_DEFINED
                                            •   RELEVANCE_RULE
cs11Label         CCCA log is detected by   CCCA_DetectionSource
cs12              CCCA address              Example: 10.1.144.199
cs12Label         CCCA address              CCCA_Destination
cs13              CCCA type                 •   IP_DOMAIN
                                            •   IP_DOMAIN_PORT
                                            •   URL
                                            •   EMAIL
cs13Label         CCCA type                 CCCA_DestinationFormat
                                                                                 5-5
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                       Value
      deviceDirection                   Packet direction           •   0: Source is external
                                                                   •   1: Source is internal
                                                                   •   2: Unknown
      deviceGUID                        Appliance GUID             Example: 6B593E17AFB7-40FBBB28-
                                                                   A4CE-0462-A536
      deviceMacAddress                  Appliance MAC address      Example: 00:0C:29:6E:CB:F9
      devicePayloadId                   An extendable field.       Examples:
                                        Format: {threat_type}:     •   With pcap file captured:
                                        {log_id}:{with pcap file       2:10245:P
                                        captured}{:extensions}*
                                                                   •   Without pcap file captured:
                                                                       2:10245:
      deviceRiskConfidenceLeve          Confidence level           •   1: High
      l
                                                                   •   2: Medium
                                                                   •   3: Low
                                                                   •   0: Undefined
      dhost                             Destination host name      Example: dhost1
      dmac                              Destination MAC            Example: 00:0C:29:6E:CB:F9
      dOSName                           Destination host OS        Example: Android
      dpt                               Destination port           Value between 0 and 65535
      dst                               Destination IP address     Example: 10.1.144.199
      duser                             Mail recipient             Example: duser1
      dUser1                            Destination user name 1    Example: admin
      dUser1LoginTime                   Destination user log on    Example: Mar 09 2015 17:05:21 GMT
                                        time 1                     +08:00
      dUser2                            Destination user name 2    Example: admin
5-6
                                                             Syslog Content Mapping - TMEF
           TMEF Key          Description                        Value
dUser2LoginTime       Destination user log on   Example: Mar 09 2015 17:05:21 GMT
                      time 2                    +08:00
dUser3                Destination user name 3   Example: admin
dUser3LoginTime       Destination user log on   Example: Mar 09 2015 17:05:21 GMT
                      time 3                    +08:00
dvc                   Appliance IP address      Example: 10.1.144.199
dvchost               Appliance host name       Example: localhost
evtCat                Event category            Example: Suspicious Traffic
evtSubCat             Event sub category        Example: Email
externalId            Log ID                    Example: 11
fileHash              SHA1                      Example:1EDD5B38DE47295457670
                                                88C5CAB395E4197C8F3
filePath              File path                 Example: SHARE\\
fileType              Real file type            Example: 1638400
fname                 File name                 Example: excel.rar
fsize                 File size                 Example: 131372
hackerGroup           Hacker group              Example: Comment Crew
hackingCampaign       Hacking campaign          Example: Aurora
hostSeverity          Host Severity             Example: 4
interestedIp          Interested IP             Example: 10.1.144.199
mailMsgSubject        Mail subject              Example: hello
malFamily             Malware family            Example: Duqu
malName               Malware name              Example: HEUR_NAMETRICK.A
malType               Malware type              Example: MALWARE
                                                                                      5-7
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                          Value
      messageId                         Message ID                  Example:
                                                                    <20090130042416.7060505@jovenci
                                                                    tasvirgenes.com.ar>
      mitigationTaskId                  Event task ID for           Example:
                                        mitigation                  dc036acb-9a2e-4939-8244-
                                                                    dedbda9ec4ba
      oldFileHash                       Mail attachment SHA1        Example:
                                                                    1EDD5B38DE4729545767088C5CAB
                                                                    395E4197C8F3
      oldFileName                       Mail attachment file name   Example: excel.rar
      oldFileSize                       Mail attachment file size   Example: 150000
      oldFileType                       Mail attachment file type   Example: 1638400
      pAttackPhase                      Primary attack phase        •     Intelligence Gathering
                                                                    •     Point of Entry
                                                                    •     Command and Control
                                                                          Communication
                                                                    •     Lateral Movement
                                                                    •     Asset and Data Discovery
                                                                    •     Data Exfiltration
                                                                    •     Nil (no applicable attack phase)
      pComp                             Detection engine/           Example: VSAPI
                                        component
      peerIP                            Peer IP                     Example: 10.1.144.199
      ptype                             Application type            IDS
      reason                            Reason                      Example: ["Protocol: 4"]
      request                           URL                         Example: http://1.2.3.4/query?
                                                                    term=value
5-8
                                                                    Syslog Content Mapping - TMEF
         TMEF Key                Description                           Value
requestClientApplication   User agent                 Example: IE
rt                         Log generation time        Example: Mar 09 2015 17:05:21 GMT
                                                      +08:00
ruleId                     Rule ID                    Example: 52
ruleName                   Description                Example: Email message sent
                                                      through an unregistered SMTP
                                                      server
sAttackPhase               Secondary attack phase     •   Intelligence Gathering
                                                      •   Point of Entry
                                                      •   Command and Control
                                                          Communication
                                                      •   Lateral Movement
                                                      •   Asset and Data Discovery
                                                      •   Data Exfiltration
                                                      •   Nil (no applicable attack phase)
shost                      Source host name           Example: shost1
smac                       Source MAC                 Example: 00:0C:29:6E:CB:F9
sOSName                    Source host OS             Example: Android
spt                        Source port                Value between 0 and 65535
src                        Source IP address          Example: 10.1.144.199
suid                       User name                  Example: User1
suser                      Mail sender                Example: suser1
sUser1                     Source user name 1         Example: admin
sUser1LoginTime            Source user log on time1   Example: Mar 09 2015 17:05:21 GMT
                                                      +08:00
sUser2                     Source user name 2         Example: admin
                                                                                             5-9
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                       Value
       sUser2LoginTime                  Source user log on time 2   Example: Mar 09 2015 17:05:21 GMT
                                                                    +08:00
       sUser3                           Source user name 3          Example: admin
       sUser3LoginTime                  Source user log on time 3   Example: Mar 09 2015 17:05:21 GMT
                                                                    +08:00
       vLANId                           VLANID                      Value between 0 and 4095
       Log sample:
       CEF:0|Trend Micro|Deep Discovery Inspector|
       5.0.1329|100100|
       MALWARE_DETECTION|8| ptype=IDS dvc=172.22.9.32
       deviceMacAddress=00:50:56:AD:03:BD dvchost=localhost
        deviceGUID=E9A3FA433916-4738984C-A4BF-84A0-D603
       rt=Jun 22 2017 09:42:47 GMT+08:00 appGroup=HTTP
       app=HTTP vLANId=4095 deviceDirection=1 dhost=172.22.9.5
        dst=172.22.9.5 dpt=57908 dmac=00:50:56:82:e7:a9
       shost=172.22.9.54 src=172.22.9.54 spt=80
       smac=00:50:56:82:c6:ae
       cs3Label=HostName_Ext cs3=172.22.9.54
       malName=Eicar_test_file
       malType=Virus fname=eicarcom2.zip fileType=262340608
       fsize=308 ruleId=0 ruleName=Eicar_test_file -
       HTTP (Response) deviceRiskConfidenceLevel=0 cn3Label=Deep
       Discovery_PotentialRisk cn3=0 cs4Label=Deep
       Discovery_SrcGroup
       cs4=Default cs5Label=Deep Discovery_SrcZone cs5=1
       cs9Label=Deep Discovery_DstGroup cs9=Default
       cs10Label=Deep
        Discovery_DstZone cs10=1 cs6Label=Deep
        Discovery_DetectionType
       cs6=0 request=http://172.22.9.54/eicarcom2.zip
       requestClientApplication=Wget/1.12 (linux-gnu)
       pComp=VSAPI act=not blocked cn4Label=Deep
       Discovery_ThreatType
        cn4=0 peerIp=172.22.9.5
       fileHash=BEC1B52D350D721C7E22A6D4BB0A92909893A3AE
5-10
                                                                Syslog Content Mapping - TMEF
   compressedFileName=eicar.com interestedIp=172.22.9.54
  cnt=1 dOSName=Linux cn5Label=AggregatedCount
  cn5=1 evtCat=Malware evtSubCat=Trojan cn2Label=APT
   Related cn2=0 pAttackPhase=Point of Entry externalId=143
  cn7Label=HeurFlag cn7=0 compressedFileType=327680
  compressedFileHash=3395856CE81F2B7382DEE72602F
  798B642F14140 hostSeverity=8 reason=["Malware:
  Eicar_test_file"] devicePayloadId=0:143:P
TMEF Disruptive Application Logs
  Table 5-2. TMEF Disruptive Application Logs
          TMEF Key                 Description                     Value
   Header (logVer)           TMEF format version   CEF: 0
   Header (vendor)           Appliance vendor      Trend Micro
   Header (pname)            Appliance product     Deep Discovery Inspector
   Header (pver)             Appliance version     Example: 3.8.1181
   Header (eventid)          Signature ID          100120
   Header (eventName)        Event Name            DISRUPTIVE_APPLICATION_DETECT
                                                   ION
   Header (severity)         Severity              •   2: Informational
                                                   •   4: Low
                                                   •   6: Medium
                                                   •   8: High
   app                       Protocol              Example: HTTP
   appGroup                  Protocol group        Example: HTTP
   cnt                       Total count           Example: 1
                                                                                       5-11
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                     Value
       cn4                              Threat type              6
       cn4Label                         Threat type              Deep Discovery_ThreatType
       cn5                              Aggregated count         Example: 1
       cn5Label                         Aggregated count         AggregatedCnt
       cs4                              Network Group assigned   Example: monitor1
                                        to a source host
       cs4Label                         Network Group assigned   Deep Discovery_SrcGroup
                                        to a source host
       cs5                              Source zone              •   0: Not in monitored network
                                                                 •   1: In monitored network and
                                                                     trusted
                                                                 •   2: In monitored network and
                                                                     not trusted
       cs5Label                         Source zone              Deep Discovery_SrcZone
       cs9                              Network Group assigned   Example: monitor1
                                        to a destination host
       cs9Label                         Network Group assigned   Deep Discovery_DstGroup
                                        to a destination host
       cs10                             Destination zone         •   0: Not in monitored network
                                                                 •   1: In monitored network and
                                                                     trusted
                                                                 •   2: In monitored network and
                                                                     not trusted
       cs10Label                        Destination zone         Deep Discovery_DstZone
       deviceDirection                  Packet direction         •   0: Source is external
                                                                 •   1: Source is internal
                                                                 •   2: Unknown
5-12
                                                            Syslog Content Mapping - TMEF
          TMEF Key         Description                         Value
deviceGUID           Appliance GUID             Example: 6B593E17AFB7-40FBBB28-
                                                A4CE-0462-A536
deviceMacAddress     Appliance MAC address      Example: 00:0C:29:6E:CB:F9
devicePayloadId      An extendable field.       Examples:
                     Format: {threat_type}:     •     With pcap file captured:
                     {log_id}:{with pcap file         2:10245:P
                     captured}{:extensions}*
                                                •     Without pcap file captured:
                                                      2:10245:
dhost                Destination host name      Example: dhost1
dmac                 Destination MAC            Example: 00:0C:29:6E:CB:F9
dOSName              Destination host OS        Example: Android
dpt                  Destination port           Value between 0 and 65535
dst                  Destination IP address     Example: 10.1.144.199
dvc                  Appliance IP address       Example: 10.1.144.199
dvchost              Appliance host name        Example: localhost
externalId           Log ID                     Example: 11
interestedIp         Interested IP              Example: 10.1.144.199
msg                  Description                Example: Deep Discovery Inspector
                                                detected the protocol in your
                                                monitored network.
pComp                Detection engine/          Example: VSAPI
                     component
peerIP               Peer IP                    Example: 10.1.144.199
ptype                Application type           IDS
rt                   Log generation time        Example: Mar 09 2015 17:05:21 GMT
                                                +08:00
                                                                                    5-13
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                Value
       shost                            Source host name     Example: shost1
       smac                             Source MAC           Example: 00:0C:29:6E:CB:F9
       sOSName                          Source host OS       Example: Android
       spt                              Source port          Value between 0 and 65535
       src                              Source IP address    Example: 10.1.144.199
       vLANId                           VLANID               Value between 0 and 4095
       Log sample:
       CEF:0|Trend Micro|Deep Discovery Inspector|5.0.1329|
       100120|
       DISRUPTIVE_APPLICATION_DETECTION|2|dvc=172.22.9.32
       deviceMacAddress=00:50:56:AD:03:BD dvchost=localhost
       deviceGUID=E9A3FA433916-4738984C-A4BF-84A0-D603
       ptype=IDS rt=Jun 22 2017 10:06:24 GMT+08:00 appGroup=P2P
       app=eDonkey vLANId=4095 deviceDirection=1
       dhost=10.1.100.223
       dst=10.1.100.223 dpt=4662 dmac=00:0c:29:a7:72:74
       shost=10.1.117.231 src=10.1.117.231 spt=39933
       smac=00:30:da:2d:47:32 cn5Label=AggregatedCount
       cn5=1 msg=Deep Discovery Inspector detected the
       protocol in your monitored network. cn4Label=Deep
       Discovery_ThreatType cn4=6 cs4Label=Deep
       Discovery_SrcGroup
       cs4=Default cs5Label=Deep Discovery_SrcZone cs5=1
       cs9Label=Deep Discovery_DstGroup cs9=Default
       cs10Label=Deep
       Discovery_DstZone cs10=1 interestedIp=10.1.117.231
       peerIp=10.1.100.223 pComp=CAV cnt=1 externalId=11
       devicePayloadId=6:11:
5-14
                                                                Syslog Content Mapping - TMEF
TMEF Web Reputation Logs
  Table 5-3. TMEF Web Reputation Logs
          TMEF Key                  Description                    Value
   Header (logVer)          TMEF format version   CEF: 0
   Header (vendor)          Appliance vendor      Trend Micro
   Header (pname)           Appliance product     Deep Discovery Inspector
   Header (pver)            Appliance version     Example: 3.8.1181
   Header (eventid)         Signature ID          100101
   Header (eventName)       Event Name            WEB_THREAT_DETECTION
   Header (severity)        Severity              •    2: Informational
                                                  •    4: Low
                                                  •    6: Medium
                                                  •    8: High
   app                      Protocol              Example: HTTP
   appGroup                 Protocol group        Example: HTTP
   cn1                      CCCA detection        0 or 1
   cn1Label                 CCCA detection        CCCA_Detection
   cn2                      Score                 Example: 49
   cn2Label                 Score                 Score
   cn4                      Threat type           5
   cn4Label                 Threat type           Deep Discovery_ThreatType
                                                                                       5-15
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                     Value
       cn6                              CCCA Risk Level          •   0: Unknown
                                                                 •   1: Low
                                                                 •   2: Medium
                                                                 •   3: High
       cn6Label                         CCCA Risk Level          CCCA_RiskLevel
       cs3                              Host name                Example: CLIENT1
       cs3Label                         Host name                HostName_Ext
       cs4                              Network Group assigned   Example: monitor1
                                        to a source host
       cs4Label                         Network Group assigned   Deep Discovery_SrcGroup
                                        to a source host
       cs5                              Source zone              •   0: Not in monitored network
                                                                 •   1: In monitored network and
                                                                     trusted
                                                                 •   2: In monitored network and
                                                                     not trusted
       cs5Label                         Source zone              Deep Discovery_SrcZone
       cs9                              Network Group assigned   Example: monitor1
                                        to a destination host
       cs9Label                         Network Group assigned   Deep Discovery_DstGroup
                                        to a destination host
       cs10                             Destination zone         •   0: Not in monitored network
                                                                 •   1: In monitored network and
                                                                     trusted
                                                                 •   2: In monitored network and
                                                                     not trusted
       cs10Label                        Destination zone         Deep Discovery_DstZone
5-16
                                                            Syslog Content Mapping - TMEF
          TMEF Key         Description                         Value
cs11                 CCCA log is detected by    •   GLOBAL_INTELLIGENCE
                                                •   VIRTUAL_ANALYZER
                                                •   USER_DEFINED
                                                •   RELEVANCE_RULE
cs11Label            CCCA log is detected by    CCCA_DetectionSource
deviceGUID           Appliance GUID             Example: 6B593E17AFB7-40FBBB28-
                                                A4CE-0462-A536
deviceMacAddress     Appliance MAC address      Example: 00:0C:29:6E:CB:F9
devicePayloadId      An extendable field.       Examples:
                     Format: {threat_type}:     •   With pcap file captured:
                     {log_id}:{with pcap file       2:10245:P
                     captured}{:extensions}*
                                                •   Without pcap file captured:
                                                    2:10245:
dvc                  Appliance IP address       Example: 10.1.144.199
dvchost              Appliance host name        Example: localhost
deviceDirection      Packet direction           •   0: Source is external
                                                •   1: Source is internal
                                                •   2: Unknown
dhost                Destination host name      Example: 'dhost1
dmac                 Destination MAC            Example: 00:0C:29:6E:CB:F9
dOSName              Destination host OS        Example: Android
dpt                  Destination port           Value between 0 and 65535
dst                  Destination IP address     Example: 10.1.144.199
duser                Mail recipient             Example: duser1
externalId           Log ID                     Example: 11
                                                                                   5-17
Trend Micro Deep Discovery Inspector Syslog Guide
                 TMEF Key                      Description                       Value
       hostSeverity                     Host Severity            Example: 4
       interestedIp                     Interested IP            Example: 10.1.144.199
       mailMsgSubject                   Mail subject             Example: hello
       msg                              Description              Example: C&C Server URL in Web
                                                                 Reputation Services database -
                                                                 HTTP (Request)
       pAttackPhase                     Primary attack phase     •     Intelligence Gathering
                                                                 •     Point of Entry
                                                                 •     Command and Control
                                                                       Communication
                                                                 •     Lateral Movement
                                                                 •     Asset and Data Discovery
                                                                 •     Data Exfiltration
                                                                 •     Nil (no applicable attack phase)
       pComp                            Detection engine/        Example: VSAPI
                                        component
       peerIp                           Peer IP                  Example: 10.1.144.199
       ptype                            Application type         IDS
       reason                           Reason                   Example: ["Protocol: 4"]
       request                          URL                      Example: http://1.2.3.4/query?
                                                                 term=value
       requestClientApplication         User agent               Example: IE
       rt                               Log generation time      Example: Mar 09 2015 17:05:21 GMT
                                                                 +08:00
       sAttackPhase                     Secondary attack phase   Example: Point of Entry
       shost                            Source host name         Example: shost1
5-18
                                                   Syslog Content Mapping - TMEF
         TMEF Key        Description                  Value
smac                Source MAC          Example: 00:0C:29:6E:CB:F9
sOSName             Source host OS      Example: Android
spt                 Source port         Value between 0 and 65535
src                 Source IP address   Example: 10.1.144.199
suser               Mail sender         Example: suser1
urlCat              URL category        Example: C&C Server
vLANId              VLANID              Value between 0 and 4095
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|5.0.1329|
100101|WEB_THREAT_DETECTION|8|dvc=172.22.9.32
deviceMacAddress=00:50:56:AD:03:BD dvchost=localhost
deviceGUID=E9A3FA433916-4738984C-A4BF-84A0-D603
ptype=IDS rt=Jun 22 2017 10:00:17 GMT+08:00
cs3Label=HostName_Ext
cs3=ca95-1.winshipway.com cs4Label=Deep
Discovery_SrcGroup
cs4=Default cs5Label=Deep Discovery_SrcZone cs5=1
cs10Label=Deep Discovery_DstZone cs10=0 cn2Label=Score
cn2=49 cn4Label=Deep Discovery_ThreatType cn4=5
dmac=00:16:c8:65:98:d5 shost=172.22.9.5 src=172.22.9.5
spt=41757 smac=00:50:56:82:e7:a9 interestedIp=172.22.9.5
cn1Label=CCCA_Detection cn1=1 msg=Ransomware URL
in Web Reputation Services database - HTTP (Request)
request=http://ca95-1.winshipway.com/
requestClientApplication=Wget/1.12
(linux-gnu) pComp=TMUFE appGroup=HTTP app=HTTP
vLANId=4095 deviceDirection=1 dhost=150.70.162.115
dst=150.70.162.115 dpt=80 urlCat=Ransomware
peerIp=150.70.162.115
sOSName=Linux cn6Label=CCCA_RiskLevel cn6=3
cs11Label=CCCA_DetectionSource
cs11=RELEVANCE_RULE externalId=17 hostSeverity=8
reason=["URL: http://ca95-1.winshipway.com/"]
                                                                          5-19
Trend Micro Deep Discovery Inspector Syslog Guide
       pAttackPhase=Command and Control Communication
       devicePayloadId=5:17:P
TMEF System Logs
       Table 5-4. TMEF System Logs
                  TMEF Key                     Description                      Value
        Header (logVer)                 TMEF format version     CEF: 0
        Header (vendor)                 Appliance vendor        Trend Micro
        Header (pname)                  Appliance product       Deep Discovery Inspector
        Header (pver)                   Appliance version       Example: 3.8.1181
        Header (eventid)                Signature ID            •   300102
                                                                •   300999
        Header (eventName)              Event Name              •   PRODUCT_UPDATE
                                                                •   SYSTEM_EVENT
                                                                •   PRODUCT_UPDATE
        Header (severity)               Severity                •   2: Informational
                                                                •   4: Warning
                                                                •   6: Severe
                                                                Example: 2
        deviceGUID                      Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                                A4CE-0462-A536
        deviceMacAddress                Appliance MAC address   Example: 00:0C:29:6E:CB:F9
        duser                           Action by               Example: admin
        dvc                             Appliance IP address    Example: 10.1.144.199
        dvchost                         Appliance host name     Example: localhost
5-20
                                                          Syslog Content Mapping - TMEF
         TMEF Key         Description                        Value
engType             Engine name           Example: Advanced Threat Scan
                                          Engine for Deep Discovery (Linux,
                                          64-bit)
engVer              Engine version        Example: 10.300.1040
msg                 Description           Example: The web console timeout
                                          setting has been changed.
outcome             Outcome               •     Success
                                          •     Failure
                                          Example: Success
patType             Pattern name          Example: Deep Discovery Malware
                                          Pattern
patVer              Pattern version       Example: 14.271.92
ptype               Application type      IDS
rt                  Log generation time   Example: Mar 09 2015 17:05:21 GMT
                                          +08:00
src                 User IP address       Example: 10.1.1.1
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector
|3.85.1156|300999|SYSTEM_EVENT|2|ptype=IDS
dvc=172.22.9.12 deviceMacAddress=00:50:56:
AD:CC:EE dvchost=localhostdeviceGUID=
DBD38FFC70B4-41C792BE-D671-0040-8B1D
rt=Mar 10 2017 17:03:31 GMT+08:00
msg=The threat detection setting
has been changed. duser=admin
outcome=Success src=172.17.0.250
                                                                                 5-21
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Correlated Incident Logs
       Table 5-5. Correlation Incident Logs
                TMEF Key                       Description                     Value
        Header (logVer)                 TMEF format version      CEF: 0
        Header (vendor)                 Appliance vendor         Trend Micro
        Header (pname)                  Appliance product        Deep Discovery Inspector
        Header (pver)                   Appliance version        Example: 3.8.1181
        Header (eventid)                Signature ID             100127
        Header (eventName)              Event Name               SUSPICIOUS_BEHAVIOUR_DETECTI
                                                                 ON
        Header (severity)               Severity                 •   2: Informational
                                                                 •   4: Low
                                                                 •   6: Medium
                                                                 •   8: High
        app                             Protocol                 Example: HTTP
        cs1                             Interested group         Example: Default
        cs1Label                        Interested group         DD_InterestedGroup
        cs2                             Malware server address   Example: 10.1.144.199
        cs2Label                        Malware server address   Malware_Server_IP_Address
        cs3                             Number of downloaded     Example: 1
                                        malware files
        cs3Label                        Number of downloaded     Number_of_Malware_Files_Downlo
                                        malware files            aded
        cs10                            Malware name             Example: HEUR_NAMETRICK.A
        cs10Label                       Malware name             Malware_Name
5-22
                                                             Syslog Content Mapping - TMEF
          TMEF Key           Description                        Value
deviceDirection        Packet direction        •     0: Source is external
                                               •     1: Source is internal
                                               •     2: Unknown
deviceGUID             Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                               A4CE-0462-A536
deviceMacAddress       Appliance MAC address   Example: 00:0C:29:6E:CB:F9
dvc                    Appliance IP address    Example: 10.1.144.199
dvchost                Appliance host name     Example: localhost
interestedHost         Interested host         Example: trend.net
interestedIp           Interested IP           Example: 10.1.144.199
interestedMacAddress   Interested MAC          Example: 00:0C:29:6E:CB:F9
interestedUser         Interested user 1       Example: user1
interestedUser2        Interested user 2       Example: user2
interestedUser3        Interested user 3       Example: user3
pComp                  Detection engine/       Correlation
                       component
peerHost               Peer host               Example: 10.1.144.199
peerIp                 Peer IP                 Example: 10.1.144.199
ptype                  Application type        IDS
rt                     Log generation time     Example: Mar 09 2015 17:05:21 GMT
                                               +08:00
ruleId                 Rule ID                 Example: 52
ruleName               Description             Example: Email message sent
                                               through an unregistered SMTP
                                               server
                                                                                    5-23
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                      Value
        threatName                      Threat name           Example: Malware File Downloaded
        threatType                      Threat type           Example: Malware-related
       Log sample:
       CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|100127|S
       USPICIOUS_BEHAVIOUR_DETECTION|2|dvc=10.201.156.143 deviceMac
       Address=00:0C:29:A6:53:0C dvchost=ddi38-143 pComp=Correlatio
       n ptype=IDS deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF0E
       rt=Mar 11 2015 22:05:50 GMT-04:00 deviceDirection=1 interest
       edIp=172.16.0.100 interestedHost=172.16.0.100 interestedMacA
       ddress=00:0c:29:70:45:36 ruleId=47 ruleName=This host has re
       sponded to DNS queries. threatType=Unregistered Service thre
       atName=Unregistered DNS Server app=DNS Response cs1Label=DD_
       InterestedGroup cs1=Default peerHost=172.16.1.141 peerIp=172
       .16.1.141
TMEF Virtual Analyzer Logs: File Analysis Events
       Table 5-6. TMEF File Analysis Events
                TMEF Key                       Description                      Value
        Header (logVer)                 TMEF format version   CEF: 0
        Header (vendor)                 Appliance vendor      Trend Micro
        Header (pname)                  Appliance product     Deep Discovery Inspector
        Header (pver)                   Appliance version     Example: 3.8.1181
        Header (eventid)                Signature ID          200119
        Header (eventName)              Event Name            FILE_ANALYZED
        Header (severity)               Severity              3 (fixed value)
5-24
                                                          Syslog Content Mapping - TMEF
           TMEF Key          Description                         Value
cn1                   GRID is known good      •    0: Bad file
                                              •    -1: Unknown file
                                              •    1: Good file
cn1Label              GRID is known good      GRIDIsKnownGood
cn2                   ROZ rating              •    0: No risk
                                              •    1: Low risk
                                              •    2: Medium risk
                                              •    3: High risk
cn2Label              ROZ rating              ROZRating
cn3                   PCAP ready              0 or 1
cn3Label              PCAP ready              PcapReady
deviceGUID            Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                              A4CE-0462-A536
deviceMacAddress      Appliance MAC address   Example: 00:0C:29:6E:CB:F9
deviseOSName          Sandbox image type      Example: win7
deviceProcessHash     Parent SHA1             Example:
                                              1EDD5B38DE4729545767088C5CAB
                                              395E4197C8F3
dvc                   Appliance IP address    Example: 10.1.144.199
dvchost               Appliance host name     Example: localhost
fileHash              File SHA1               Example:
                                              1EDD5B38DE4729545767088C5CAB
                                              395E4197C8F3
fileType              True file type          Example: 1638400
fname                 File name               Example: excel.rar
fsize                 File size               Example: 131372
                                                                                 5-25
Trend Micro Deep Discovery Inspector Syslog Guide
                TMEF Key                       Description                  Value
        pComp                           Detection source      •   Sandbox
                                                              •   UDSO (User-Defined Suspicious
                                                                  Objects)
        rt                              Analysis time         Example: Mar 09 2015 17:05:21 GMT
                                                              +08:00
       Log sample:
       CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200119|F
       ILE_ANALYZED|3|rt=Mar 11 2015 07:38:04 GMT-04:00 pComp=Sandb
       ox dvc=10.201.156.143 dvchost=ddi38-143 deviceMacAddress=00:
       0C:29:A6:53:0C deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF
       0E fname=multiple_mask.swf fileHash=643DBF968EF3BECD9A73CF1D
       CF44006BC46E15F7 malName=SWF_Lfm.926 fileType=Macromedia Fla
       sh fsize=9400 deviceOSName=MAK_win7sp1en_offices_noab_TL cn2
       Label=ROZRating cn2=3 cn1Label=GRIDIsKnownGood cn1=-1 cn3Lab
       el=PcapReady cn3=1
TMEF Virtual Analyzer Logs: Notable
Characteristics Events
       Table 5-7. TMEF Notable Characteristics Events
                TMEF Key                       Description                  Value
        Header (logVer)                 TMEF format version   CEF: 0
        Header (vendor)                 Appliance vendor      Trend Micro
        Header (pname)                  Appliance product     Deep Discovery Inspector
        Header (pver)                   Appliance version     Example: 3.8.1181
        Header (eventid)                Signature ID          200127
        Header (eventName)              Event Name            NOTABLE_CHARACTERISTICS
5-26
                                                            Syslog Content Mapping - TMEF
           TMEF Key          Description                          Value
Header (severity)     Severity                  6 (fixed value)
deviceGUID            Appliance GUID            Example: 6B593E17AFB7-40FBBB28-
                                                A4CE-0462-A536
deviceMacAddress      Appliance MAC address     Example: 00:0C:29:6E:CB:F9
deviceOSName          Sandbox image type        Example: win7
dvc                   Appliance IP address      Example: 10.1.144.199
dvchost               Appliance host name       Example: localhost
fileHash              File SHA1                 Example:
                                                1EDD5B38DE4729545767088C5CAB
                                                395E4197C8F3
fileType              True file type            Example: 1638400
fname                 File name                 Example: excel.rar
fsize                 File size                 Example: 131372
msg                   Details                   Example:
                                                www.chapisteriadaniel.com
pComp                 Detection source          Sandbox
rt                    Analysis time             Example: Mar 09 2015 17:05:21 GMT
                                                +08:00
ruleCategory          Violated policy name      Example: Internet Explorer Setting
                                                Modification
ruleName              Analysis violated event   Example: Modified important
                                                registry items
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200127|N
OTABLE_CHARACTERISTICS|6|rt=Mar 11 2015 05:00:26 GMT-04:00 p
Comp=Sandbox dvc=10.201.156.143 dvchost=ddi38-143 deviceMacA
ddress=00:0C:29:A6:53:0C deviceGUID=D2C1D6D20FF8-4FC98F92-25
EB-D7DA-AF0E fname=DTAS_WIN32_07 fileHash=672B1A8ADB412C272C
                                                                                   5-27
Trend Micro Deep Discovery Inspector Syslog Guide
       CA21A214732C447B650349 fileType=WIN32 EXE fsize=290304 ruleC
       ategory=Suspicious network or messaging activity ruleName=Qu
       eries DNS server msg=012webpages.com deviceOSName=MAK_win7sp
       1en_offices_noab_TL
TMEF Virtual Analyzer Logs: Deny List Transaction
Events
       Table 5-8. TMEF Deny List Transaction Events
                TMEF Key                       Description                          Value
        Header (logVer)                 TMEF format version       CEF: 0
        Header (vendor)                 Appliance vendor          Trend Micro
        Header (pname)                  Appliance product         Deep Discovery Inspector
        Header (pver)                   Appliance version         Example: 3.8.1181
        Header (eventid)                Signature ID              200120
        Header (eventName)              Event Name                DENYLIST_CHANGE
        Header (severity)               Severity                  3 (fixed value)
        act                             The action in the event   Add or Remove
        cs1                             Deny List type            •      Deny List IP/Port
                                                                  •      Deny List URL
                                                                  •      Deny List File SHA1
                                                                  •      Deny List Domain
        cs1Label                        Deny List type            type
5-28
                                                            Syslog Content Mapping - TMEF
          TMEF Key             Description                     Value
deviceExternalRiskType   Risk level              •   Low
                                                 •   Medium
                                                 •   High
                                                 •   Confirmed malware
deviceGUID               Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                 A4CE-0462-A536
deviceMacAddress         Appliance MAC address   Example: 00:0C:29:6E:CB:F9
dhost                    Destination host name   Example: insta-find.com
dpt                      Remote port             Value between 0 and 65535
dst                      Remote IP               Example: 10.1.144.199
dvc                      Appliance IP address    Example: 10.1.144.199
dvchost                  Appliance host name     Example: localhost
end                      Report end time         Example: Mar 09 2015 17:05:21 GMT
                                                 +08:00
fileHash                 File SHA1               Example:
                                                 1EDD5B38DE4729545767088C5CAB
                                                 395E4197C8F3
pComp                    Detection source        Sandbox
request                  URL                     Example: _http://1.2.3.4/query?
                                                 term=value
rt                       Analysis time           Example: Mar 09 2015 17:05:21 GMT
                                                 +08:00
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200120|D
ENYLIST_CHANGE|3|rt=Mar 11 2015 07:15:45 GMT-04:00 pComp=San
dbox dvc=10.201.156.143 dvchost=ddi38-143 deviceMacAddress=0
0:0C:29:A6:53:0C deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-
AF0E cs1Label=type cs1=Deny List URL end=Apr 10 2015 07:15:3
                                                                                   5-29
Trend Micro Deep Discovery Inspector Syslog Guide
       5 GMT-04:00 act=Add request=http://zalepivmordu.ru:80/ devic
       eExternalRiskType=Medium
TMEF Retro Scan Report Logs
       Table 5-9. TMEF Retro Scan Report Logs
                TMEF Key                       Description                    Value
        Header (logVer)                 TMEF format version     CEF: 0
        Header (vendor)                 Appliance vendor        Trend Micro
        Header (pname)                  Appliance product       Deep Discovery Inspector
        Header (pver)                   Appliance version       Example: 3.8.1181
        Header (eventid)                Signature ID            100133
        Header (eventName)              Event Name              RETROSCAN_REPORT
        Header (severity)               Severity                8
        callback_attempt_num            Number of callback      Example: 20
                                        attempts
        cnc_host_num                    Number of C&C hosts     Example: 1
        compromised_client_num          Number of compromised   Example: 1
                                        clients
        deviceGUID                      Appliance GUID          Example: 6B593E17AFB7-40FBBB28-
                                                                A4CE-0462-A536
        firstCallbackTime               First callback time     Example: Mar 09 2015 17:05:21 GMT
                                                                +08:00
        lastCallbackTime                Last callback time      Example: Mar 09 2015 17:05:21 GMT
                                                                +08:00
        report_id                       Report ID               Example: 74c15fe0-90c9-446b-
                                                                abc4-379d6d7213e7
5-30
                                                              Syslog Content Mapping - TMEF
          TMEF Key                 Description                   Value
   report_ts                 Report time           Example: Mar 09 2015 17:05:21 GMT
                                                   +08:00
   report_url                Report URL            Example: https://
                                                   retroscan.trendmicro.com/
                                                   retroscan/scanDetails.html?
                                                   reportID\=1e84c77b-0452-4f00-
                                                   b5b8-e41c0ea9ef1a &reportType
                                                   \=standard
  Log sample:
  CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1200|100133|R
  ETROSCAN_REPORT|8|guid=906A61690458-4099A441-898C-BDD2-C7C1
  report_ts=Mar 29 2015 03:14:27 GMT+02:00 report_id=ffa9474d-
  6d72-44f7-a99c-c0d230fec1f3 report_url=https://retroscan.tre
  ndmicro.com/retroscan/scanDetails.html?reportID\=1e84c77b-04
  52-4f00-b5b8-e41c0ea9ef1a&reportType\=standard compromised_c
  lient_num=1 cnc_host_num=1 callback_attempt_num=20 firstCall
  backTime=Mar 29 2015 03:04:27 GMT+02:00 lastCallbackTime=Mar
   29 2015 03:09:27 GMT+02:00
TMEF Retro Scan Detection Logs
  Table 5-10. TMEF Retro Scan Detection Logs
          TMEF Key                 Description                   Value
   Header (logVer)           TMEF format version   CEF: 0
   Header (vendor)           Appliance vendor      Trend Micro
   Header (pname)            Appliance product     Deep Discovery Inspector
   Header (pver)             Appliance version     Example: 3.8.1181
   Header (eventid)          Signature ID          100134
   Header (eventName)        Event Name            RETROSCAN_DETECTION
                                                                                     5-31
Trend Micro Deep Discovery Inspector Syslog Guide
                 TMEF Key                      Description                     Value
       Header (severity)                Severity                 8
       callback_address                 Callback address         Example: http://1.2.3.4/
       callback_time                    Callback time            Example: Mar 09 2015 17:05:21 GMT
                                                                 +08:00
       category                         Category                 Example: Reference
       cnc_host                         C&C host address         Example: 10.1.144.199
       compromised_client               Compromised client       Example: 10.1.144.199
                                        address
       deviceGUID                       Appliance GUID           Example: 6B593E17AFB7-40FBBB28-
                                                                 A4CE-0462-A536
       protocol                         Protocol                 Example: HTTP
       rating                           Rating                   Example: Suspicious
       related_attacker_group           Related attacker group   Example: Elise|Taidoor
       related_malware                  Related malware          Example: fosniw|ge|palevo
       report_id                        Report ID                Example: 74c15fe0-90c9-446b-
                                                                 abc4-379d6d7213e7
       scan_category                    Scan category            Example: C&C Server
       scan_rating                      Scan rating              Example: Dangerous
       scan_ts                          Scan time                Example: Mar 09 2015 17:05:21 GMT
                                                                 +08:00
       Log sample:
       CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1200|100134|R
       ETROSCAN_DETECTION|8|guid=906A61690458-4099A441-898C-BDD2-C7
       C1 report_id=0938508b-ec47-47a1-80ea-cd8e3b747822 scan_ts=Ma
       r 29 2015 03:14:31 GMT+02:00 callback_time=Mar 29 2015 03:04
       :31 GMT+02:00 callback_address=http://app2.winsoft98.com/app
       .asp?prj\=4&pid\=haha1&logdata\=MacTryCnt:0&code\=&ver\=1.0.
       0.45&appcheck\=1 compromised_client=59.125.99.235 cnc_host=
5-32
                                             Syslog Content Mapping - TMEF
app2.winsoft98.com protocol=HTTP rating=Suspicious category
=Reference scan_rating=Dangerous scan_category=C&C Server r
elated_malware=fosniw|ge|mactrycnt|palevo related_attacker_
group=Elise|Taidoor
                                                                    5-33
TREND MICRO INCORPORATED
225 E. John Carpenter Freeway, Suite 1500
Irving, Texas 75062 U.S.A.
Phone: +1 (817) 569-8900, Toll-free: (888) 762-8736
Email: support@trendmicro.com
                                                      www.trendmicro.com
                                                         Item Code: APEM59039/200721