TREND MICRO ™
Deep Discovery Inspector
Syslog Content Mapping Guide
Breakthrough Protection Against APTs and Targeted Attacks
es ns pc
Endpoint Security Network Security Protected Cloud
Trend Micro Incorporated reserves the right to make changes to this
document and to the product described herein without notice. Before
installing and using the product, review the readme files, release notes,
and/or the latest version of the applicable documentation, which are
available from the Trend Micro website at:
http://docs.trendmicro.com
Trend Micro, the Trend Micro t-ball logo, Deep Discovery Advisor, Deep
Discovery Analyzer, Deep Discovery Inspector, and Control Manager are
trademarks or registered trademarks of Trend Micro Incorporated. All other
product or company names may be trademarks or registered trademarks of
their owners.
Copyright © 2020. Trend Micro Incorporated. All rights reserved.
Document Part No.: APEM59039/200721
Release Date: August 2020
Protected by U.S. Patent No.: 8595840; 8925074; 7707635; 8505094
This documentation introduces the main features of the product and/or
provides installation instructions for a production environment. Read
through the documentation before installing or using the product.
Detailed information about how to use specific features within the product
may be available at the Trend Micro Online Help Center and/or the Trend
Micro Knowledge Base.
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please contact us at docs@trendmicro.com.
Evaluate this documentation on the following site:
https://www.trendmicro.com/download/documentation/rating.asp
Privacy and Personal Data Collection Disclosure
Certain features available in Trend Micro products collect and send feedback
regarding product usage and detection information to Trend Micro. Some of
this data is considered personal in certain jurisdictions and under certain
regulations. If you do not want Trend Micro to collect personal data, you
must ensure that you disable the related features.
The following link outlines the types of data that Deep Discovery Inspector
collects and provides detailed instructions on how to disable the specific
features that feedback the information.
https://success.trendmicro.com/data-collection-disclosure
Data collected by Trend Micro is subject to the conditions stated in the Trend
Micro Privacy Notice:
https://www.trendmicro.com/privacy
Table of Contents
Chapter 1: Introduction
Terminology ....................................................................... 1-2
Chapter 2: Revisions
Chapter 3: Syslog Content Mapping - CEF
CEF Threat Logs ................................................................. 3-2
CEF Disruptive Application Logs .......................................... 3-7
CEF Web Reputation Logs ................................................... 3-9
CEF System Logs ............................................................... 3-13
CEF Virtual Analyzer Logs: File Analysis Events .................. 3-15
CEF Virtual Analyzer Logs: Notable Characteristics Events .. 3-17
CEF Virtual Analyzer Logs: Deny List Transaction Events .... 3-19
Chapter 4: Syslog Content Mapping - LEEF
LEEF Threat Logs ............................................................... 4-2
LEEF Disruptive Application Logs ........................................ 4-9
LEEF Web Reputation Logs ................................................ 4-12
LEEF System Logs ............................................................. 4-16
LEEF Correlation Incident Logs ......................................... 4-17
LEEF Virtual Analyzer Logs: File Analysis Events ................ 4-20
LEEF Virtual Analyzer Logs: Notable Characteristics Events 4-22
LEEF Virtual Analyzer Logs: Deny List Transaction Event .... 4-24
i
Trend Micro Deep Discovery Inspector Syslog Guide
Chapter 5: Syslog Content Mapping - TMEF
TMEF Threat Logs .............................................................. 5-2
TMEF Disruptive Application Logs ..................................... 5-11
TMEF Web Reputation Logs ............................................... 5-15
TMEF System Logs ............................................................ 5-20
TMEF Correlated Incident Logs ......................................... 5-22
TMEF Virtual Analyzer Logs: File Analysis Events ............... 5-24
TMEF Virtual Analyzer Logs: Notable Characteristics Events 5-26
TMEF Virtual Analyzer Logs: Deny List Transaction Events . 5-28
TMEF Retro Scan Report Logs ............................................ 5-30
TMEF Retro Scan Detection Logs ....................................... 5-31
ii
Preface
Preface
Learn more about the following topics:
• Documentation on page iv
• Audience on page v
• Document Conventions on page v
• About Trend Micro on page vi
iii
Trend Micro Deep Discovery Inspector Syslog Guide
Documentation
The documentation set for Deep Discovery Inspector includes the following:
Table 1. Product Documentation
Document Description
Administrator's Guide The Administrator's Guide contains detailed instructions on
how to configure and manage Deep Discovery Inspector, and
explanations on Deep Discovery Inspector concepts and
features.
AWS Deployment Guide The AWS Deployment Guide contains information about
requirements and procedures for planning deployment,
deploying, and troubleshooting Deep Discovery Inspector
deployment on AWS.
Installation and Deployment The Installation and Deployment Guide contains information
Guide about requirements and procedures for planning deployment,
installing Deep Discovery Inspector, and using the
Preconfiguration Console to set initial configurations and
perform system tasks.
Syslog Content Mapping The Syslog Content Mapping Guide provides information about
Guide log management standards and syntaxes for implementing
syslog events in Deep Discovery Inspector.
Quick Start Card The Quick Start Card provides user-friendly instructions on
connecting Deep Discovery Inspector to your network and on
performing the initial configuration.
Readme The Readme contains late-breaking product information that is
not found in the online or printed documentation. Topics
include a description of new features, known issues, and
product release history.
Online Help Web-based documentation that is accessible from the Deep
Discovery Inspector management console.
The Online Help contains explanations of Deep Discovery
Inspector components and features, as well as procedures
needed to configure Deep Discovery Inspector.
iv
Preface
Document Description
Support Portal The Support Portal is an online database of problem-solving
and troubleshooting information. It provides the latest
information about known product issues. To access the
Support Portal, go to the following website:
https://success.trendmicro.com
View and download product documentation from the Trend Micro Online
Help Center:
https://docs.trendmicro.com/en-us/home.aspx
Audience
The Deep Discovery Inspector documentation is written for IT
administrators and security analysts. The documentation assumes that the
reader has an in-depth knowledge of networking and information security,
including the following topics:
• Network topologies
• Database management
• Antivirus and content security protection
The documentation does not assume the reader has any knowledge of
sandbox environments or threat event correlation.
Document Conventions
The documentation uses the following conventions:
v
Trend Micro Deep Discovery Inspector Syslog Guide
Table 2. Document Conventions
Convention Description
UPPER CASE Acronyms, abbreviations, and names of certain commands
and keys on the keyboard
Bold Menus and menu commands, command buttons, tabs, and
options
Italics References to other documents
Monospace Sample command lines, program code, web URLs, file names,
and program output
Navigation > Path The navigation path to reach a particular screen
For example, File > Save means, click File and then click
Save on the interface
Configuration notes
Note
Recommendations or suggestions
Tip
Information regarding required or default configuration
Important
settings and product limitations
Critical actions and configuration options
WARNING!
About Trend Micro
Trend Micro, a global leader in cybersecurity, is passionate about making the
world safe for exchanging digital information today and in the future.
Artfully applying our XGen™ security strategy, our innovative solutions for
consumers, businesses, and governments deliver connected security for data
centers, cloud workloads, networks, and endpoints.
vi
Preface
Optimized for leading environments, including Amazon Web Services,
Microsoft®, and VMware®, our layered solutions enable organizations to
automate the protection of valuable information from today’s threats. Our
connected threat defense enables seamless sharing of threat intelligence and
provides centralized visibility and investigation to make organizations their
most resilient.
Trend Micro customers include 9 of the top 10 Fortune® Global 500
companies across automotive, banking, healthcare, telecommunications,
and petroleum industries.
With over 6,500 employees in 50 countries and the world’s most advanced
global threat research and intelligence, Trend Micro enables organizations to
secure their connected world. https://www.trendmicro.com
vii
Chapter 1
Introduction
The Trend Micro™ Syslog Content Mapping Guide provides information
about log management standards and syntaxes for implementing syslog
events in Trend Micro Deep Discovery Inspector.
To enable flexible integration with third-party log management systems,
Deep Discovery Inspector supports the following syslog formats:
Log Management System Description
Common Event Format (CEF) CEF is an open log management standard
created by HP ArcSight.
For details, see Syslog Content Mapping - CEF
on page 3-1 Deep Discovery Inspector uses a subset of the
CEF dictionary.
Log Event Extended Format (LEEF) LEEF is an event format developed for IBM
Security QRadar.
For details, see Syslog Content Mapping - LEEF
on page 4-1 Deep Discovery Inspector uses a subset of the
LEEF dictionary.
Trend Micro Event Format (TMEF) TMEF is a superset of log fields that allow a
third-party syslog collector to better control
For details, see Syslog Content Mapping - TMEF and mitigate detection events provided by
on page 5-1 Deep Discovery Inspector.
1-1
Trend Micro Deep Discovery Inspector Syslog Guide
Terminology
Term Description
CEF Common Event Format
LEEF Log Event Extended Format
TMEF Trend Micro Event Format
CCCA Command and Control Contact Alert
1-2
Chapter 2
Revisions
There were no revisions for version 5.7.
2-1
Chapter 3
Syslog Content Mapping - CEF
The following tables outline syslog content mapping between Deep
Discovery Inspector log output and CEF syslog types:
• CEF Threat Logs on page 3-2
• CEF Disruptive Application Logs on page 3-7
• CEF Web Reputation Logs on page 3-9
• CEF System Logs on page 3-13
• CEF Virtual Analyzer Logs: File Analysis Events on page 3-15
• CEF Virtual Analyzer Logs: Notable Characteristics Events on page 3-17
• CEF Virtual Analyzer Logs: Deny List Transaction Events on page 3-19
3-1
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Threat Logs
Table 3-1. CEF Threat Logs
CEF Key Description Value
Header (logVer) CEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Event ID Example: 8
Header (eventName) Description Example: Packed executable file
copied to a network administrative
share
Header (severity) Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
act The action in the event blocked or not blocked
app Protocol Example: HTTP
c6a1 Interested IPv6 Example: 2001:0:0:1::21
c6a1Label Interested IPv6 InterestedIPv6
c6a2 Source IPv6 address Example: 2001:0:0:1::21
c6a2Label Source IPv6 address Source IPv6 Address
c6a3 Destination IPv6 address Example: 2001:0:0:1::21
c6a3Label Destination IPv6 address Destination IPv6 Address
c6a4 Peer IPv6 address Example: 2001:0:0:1::21
c6a4Label Peer IPv6 address PeerIPv6
3-2
Syslog Content Mapping - CEF
CEF Key Description Value
cat Event category Example: File
cnt Total count Example: 1
cn1 CCCA detection 0 or 1
cn1Label CCCA detection CCCA_Detection
cn3 Threat type • 0: Malicious content
• 1: Malicious behavior
• 2: Suspicious behavior
• 3: Exploit
• 4: Grayware
cn3Label Threat type Threat Type
cs1 Mail subject Example: hello
cs1Label Mail subject MailSubject
cs2 Malware name Example: HEUR_NAMETRICK.A
cs2Label Malware name DetectionName
cs3 Host name Example: CLIENT1
cs3Label Host name HostName_Ext
cs4 File name in archive Example: mtxlegih.dll
cs4Label File name in archive FileNameInArchive
cs5 CCCA log is detected by Example:
GLOBAL_INTELLIGENCE or
VIRTUAL_ANALYZER or
USER_DEFINED
cs5Label CCCA log is detected by CCCA_DetectionSource
3-3
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
cs6 Attack Phase • Intelligence Gathering
• Point of Entry
• Command and Control
Communication
• Lateral Movement
• Asset and Data Discovery
• Data Exfiltration
• Nil (no applicable attack phase)
cs6Label Attack Phase pAttackPhase
destinationTranslatedAdd Peer IP Example: 10.1.144.199
ress
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceExternalId Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
devicePayloadId An extendable field. Examples:
Format: {threat_type}: • With pcap file captured:
{log_id}:{with pcap file 2:10245:P
captured}{:extensions}*
• Without pcap file captured:
2:10245:
dhost Destination host name Example: dhost1
dmac Destination MAC Example: 00:0C:29:6E:CB:F9
dpt Destination port Value between 0 and 65535
dst Destination IP address Example: 10.1.144.199
duser Mail recipient Example: duser1
3-4
Syslog Content Mapping - CEF
CEF Key Description Value
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
dvcmac Appliance MAC address Example: 00:0C:29:6E:CB:F9
fileHash SHA1 Example:1EDD5B38DE47295457670
88C5CAB395E4197C8F3
filePath File path Example: SHARE\\
fileType Real file type Example: 1638400
flexNumber1 vLANId Example: 4095
flexNumber1Label vLANId vLANId
fname File name Example: excel.rar
fsize File size Example: 131372
oldFileHash Mail attachment SHA1 Example:1EDD5B38DE47295457670
88C5CAB395E4197C8F3
oldFileName Mail attachment file name Example: excel.rar
oldFileSize Mail attachment file size Example: 150000
oldFileType Mail attachment file type Example: 1638400
requestClientApplication User agent Example: IE
request URL Example: http://1.2.3.4/query?
term=value
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
shost Source host name Example: shost1
smac Source MAC Example: 00:0C:29:6E:CB:F9
sourceTranslatedAddress Interested IP Example: 10.1.144.199
src Source IP address Example: 10.1.144.199
3-5
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
spt Source port Value between 0 and 65535
suid User name Example: User1
suser Mail sender Example: suser1
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|5.0.1329|0|
Eicar_test_file
- HTTP (Response)|8|dvc=172.22.9.32
dvcmac=00:50:56:AD:03:BD
dvchost=localhost deviceExternalId=E9A3FA433916-
4738984C-A4BF-84A0-D603
rt=Jun 22 2017 09:42:47 GMT+08:00 app=HTTP
deviceDirection=1
dhost=172.22.9.5 dst=172.22.9.5 dpt=57908
dmac=00:50:56:82:e7:a9
shost=172.22.9.54 src=172.22.9.54 spt=80
smac=00:50:56:82:c6:ae
cs3Label=HostName_Ext cs3=172.22.9.54 cs2Label=
DetectionName
cs2=Eicar_test_file fname=eicarcom2.zip fileType=
262340608
fsize=308 requestClientApplication=Wget/1.12 (linux-gnu)
act=not blocked cn3Label=Threat Type cn3=0
destinationTranslatedAddress=172.22.9.5
fileHash=BEC1B52D350D721C7E22A6D4BB0A92909893A3AE
cs4Label=FileNameInArchive cs4=eicar.com
sourceTranslatedAddress=172.22.9.54
cnt=1 cat=Malware cs6Label=pAttackPhase cs6=Point
of Entry flexNumber1Label=vLANId flexNumber1=4095
request=http://172.22.9.54/eicarcom2.zip
devicePayloadId=0:143:P
3-6
Syslog Content Mapping - CEF
CEF Disruptive Application Logs
Table 3-2. CEF Disruptive Application Logs
CEF Key Description Value
Header (logVer) CEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 100120
Header (eventName) Description Deep Discovery Inspector detected
this protocol in your monitored
network.
Header (severity) Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
app Protocol Example: HTTP
c6a1 Interested IPv6 Example: 2001:0:0:1::21
c6a1Label Interested IPv6 InterestedIPv6
c6a2 Source IPv6 address Example: 2001:0:0:1::21
c6a2Label Source IPv6 address Source IPv6 Address
c6a3 Destination IPv6 address Example: 2001:0:0:1::21
c6a3Label Destination IPv6 address Destination IPv6 Address
c6a4 Peer IPv6 address Example: 2001:0:0:1::21
c6a4Label Peer IPv6 address PeerIPv6
cnt Total count Example: 1
3-7
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
cn3 Threat type 6
cn3Label Threat type ThreatType
destinationTranslatedAdd Peer IP Example: 10.1.144.199
ress
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceExternalId Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
devicePayloadId An extendable field. Examples:
Format: {threat_type}: • With pcap file captured:
{log_id}:{with pcap file 2:10245:P
captured}{:extensions}*
• Without pcap file captured:
2:10245:
dhost Destination host name Example: dhost1
dmac Destination MAC Example: 00:0C:29:6E:CB:F9
dpt Destination port Value between 0 and 65535
dst Destination IP address Example: 10.1.144.199
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
dvcmac Appliance MAC address Example: 00:0C:29:6E:CB:F9
flexNumber1 vLANId Example: 4095
flexNumber1Label vLANId vLANId
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
3-8
Syslog Content Mapping - CEF
CEF Key Description Value
shost Source host name Example: shost1
smac Source MAC Example: 00:0C:29:6E:CB:F9
sourceTranslatedAddress Interested IP Example: 10.1.144.199
spt Source port Value between 0 and 65535
src Source IP address Example: 10.1.144.199
Log Sample:
CEF:0|Trend Micro|Deep Discovery Inspector|5.0.1329|
100120|Deep
Discovery Inspector detected the protocol in your
monitored network.|2|dvc=172.22.9.32 dvcmac=
00:50:56:AD:03:BD
dvchost=localhost deviceExternalId=E9A3FA433916-
4738984C-A4BF-84A0-D603
rt=Jun 22 2017 10:06:24 GMT+08:00 app=eDonkey
deviceDirection=1 dhost=10.1.100.223 dst=10.1.100.223
dpt=4662 dmac=00:0c:29:a7:72:74 shost=10.1.117.231
src=10.1.117.231 spt=39933 smac=00:30:da:2d:47:32
cn3Label=Threat Type cn3=6 sourceTranslatedAddress=
10.1.117.231
destinationTranslatedAddress=10.1.100.223 cnt=1
flexNumber1Label=vLANId flexNumber1=4095
devicePayloadId=6:11:P
CEF Web Reputation Logs
Table 3-3. CEF Web Reputation Logs
CEF Key Description Value
Header (logVer) CEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
3-9
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 100101
Header (eventName) Description Example: Dangerous URL in Web
Reputation Services database -
HTTP (Request)
Header (severity) Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
app Protocol Example: HTTP
c6a1 Interested IPv6 Example: 2001:0:0:1::21
c6a1Label Interested IPv6 InterestedIPv6
c6a2 Source IPv6 address Example: 2001:0:0:1::21
c6a2Label Source IPv6 address Source IPv6 Address
c6a3 Destination IPv6 address Example: 2001:0:0:1::21
c6a3Label Destination IPv6 address Destination IPv6 Address
c6a4 Peer IPv6 address Example: 2001:0:0:1::21
c6a4Label Peer IPv6 address PeerIPv6
cn1 CCCA detection 0 or 1
cn1Label CCCA detection CCCA_Detection
cn2 Score Example: 49
cn2Label Score WRSScore
cn3 Threat type Example: 5
3-10
Syslog Content Mapping - CEF
CEF Key Description Value
cn3Label Threat type Threat Type
cs1 Mail subject Example: hello
cs1Label Mail subject MailSubject
cs2 Category Example: Gambling
cs2Label Category URLCategory
cs3 Host name Example: CLIENT1
cs3Label Host name HostName_Ext
cs4 Attack Phase • Intelligence Gathering
• Point of Entry
• Command and Control
Communication
• Lateral Movement
• Asset and Data Discovery
• Data Exfiltration
• Nil (no applicable attack phase)
cs4Label Attack Phase pAttackPhase
destinationTranslatedAdd Peer IP Example: 10.1.144.199
ress
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceExternalId Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
3-11
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
devicePayloadId An extendable field. Examples:
Format: {threat_type}: • With pcap file captured:
{log_id}:{with pcap file 2:10245:P
captured}{:extensions}*
• Without pcap file captured:
2:10245:
dhost Destination host name Example: dhost1
dmac Destination MAC Example: 00:0C:29:6E:CB:F9
dpt Destination port Value between 0 and 65535
dst Destination IP address Example: 10.1.144.199
duser Mail recipient Example: duser1
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
dvcmac Appliance MAC address Example: 00:0C:29:6E:CB:F9
flexNumber1 vLANId Example: 4095
flexNumber1Label vLANId vLANId
request URL Example: http://1.2.3.4/query?
term=value
requestClientApplication User agent Example: IE
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
shost Source host name Example: shost1
smac Source MAC Example: 00:0C:29:6E:CB:F9
sourceTranslatedAddress Interested IP Example: 10.1.144.199
spt Source port Value between 0 and 65535
src Source IP address Example: 10.1.144.199
3-12
Syslog Content Mapping - CEF
CEF Key Description Value
suser Mail sender Example: suser1
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector
|5.0.1329|100101|Ransomware
URL in Web Reputation Services database - HTTP
(Request)|8|dvc=172.22.9.32 dvcmac=00:50:56:AD:03:BD
dvchost=localhost deviceExternalId=E9A3FA433916-4738984
C-A4BF-84A0-D603
rt=Jun 22 2017 10:00:17 GMT+08:00 cs3Label=HostName_Ext
cs3=ca95-1.winshipway.com cn2Label=WRSScore cn2=49
cn3Label=Threat Type cn3=5 dmac=00:16:c8:65:98:d5
shost=172.22.9.5 src=172.22.9.5 spt=41757
smac=00:50:56:82:e7:a9
sourceTranslatedAddress=172.22.9.5
cn1Label=CCCA_Detection
cn1=1 request=http://ca95-1.winshipway.com/
requestClientApplication=Wget/1.12
(linux-gnu) app=HTTP deviceDirection=1
dhost=150.70.162.115
dst=150.70.162.115 dpt=80 cs2Label=URLCategory
cs2=Ransomware destinationTranslatedAddress=
150.70.162.115
cs4Label=pAttackPhase cs4=Command and Control
Communication flexNumber1Label=vLANId flexNumber1=4095
request=http://ca95-1.winshipway.com/
devicePayloadId=5:17:
CEF System Logs
Table 3-4. CEF System Logs
CEF Key Description Value
Header (logVer) CEF format version CEF: 0
3-13
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID • 300102
• 300999
Header (eventName) Description Example: The system time setting
has been changed.
Header (severity) Severity • 2: Informational
• 4: Warning
• 6: Severe
Example: 2
c6a2 Source IPv6 address Example: 2001:0:0:1::21
c6a2Label Source IPv6 address Source IPv6 Address
deviceExternalId Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
duser Action by Example: admin
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
dvcmac Appliance MAC address Example: 00:0C:29:6E:CB:F9
outcome Outcome • Success
• Failure
Example: Success
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
src User IP address Example: 10.1.1.1
3-14
Syslog Content Mapping - CEF
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1175|300999|T
he system time setting has been changed.|2|dvc=10.201.156.14
3 dvcmac=00:0C:29:A6:53:0C dvchost=ddi38-143 deviceExternalI
d=6B593E17AFB7-40FBBB28-A4CE-0462-A536 rt=Mar 09 2015 16:46:
08 GMT+08:00
CEF Virtual Analyzer Logs: File Analysis Events
Table 3-5. CEF File Analysis Events
CEF Key Description Value
Header (logVer) CEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 200119
Header (eventName) Description Sample file sandbox analysis is
finished.
Header (severity) Severity 3 (fixed value)
cn1 GRID is known good • 0: Bad file
• -1: Unknown file
• 1: Good file
cn1Label GRID is known good GRIDIsKnownGood
cn2 ROZ rating • 0: No risk
• 1: Low risk
• 2: Medium risk
• 3: High risk
3-15
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
cn2Label ROZ rating ROZRating
cn3 PcapReady Example: 0
cn3Label PcapReady PcapReady
cs1 Sandbox image type Example: win7
cs1Label Sandbox image type SandboxImageType
cs2 Virus name Example: HEUR_NAMETRICK.A
cs2Label Virus name MalwareName
cs3 Parent SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
cs3Label Parent SHA1 ParentFileSHA1
deviceExternalId Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
dvcmac Appliance MAC address Example: 00:0C:29:6E:CB:F9
fileHash SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
fileType True file type Example: WIN32 EXE
fname File name Example: excel.rar
fsize File size Example: 131372
rt Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
Log sample:
3-16
Syslog Content Mapping - CEF
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200119|S
ample file sandbox analysis is finished|3| rt=Mar 11 2015 06
:51:46 GMT-04:00 dvc=10.201.156.143 dvchost=ddi38-143 dvcmac
=00:0C:29:A6:53:0C deviceExternalId=D2C1D6D20FF8-4FC98F92-25
EB-D7DA-AF0E fname=Tomb Raider.rar fileHash=1E4677A1EF1FBAD1
1F8D06A9DAD8103C2CE861A9 fileType=RAR fsize=131372 cs1Label=
SandboxImageType cs1=MAK_win7sp1en_offices_noab_TL cn2Label=
ROZRating cn2=1 cn1Label=GRIDIsKnownGood cn1=-1 cs2Label=Mal
wareName cs2=HEUR_NAMETRICK.A cn3Label=PcapReady cn3=0
CEF Virtual Analyzer Logs: Notable Characteristics
Events
Table 3-6. CEF Notable Characteristics Events
CEF Key Description Value
Header (logVer) CEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 200127
Header (eventName) Description Notable Characteristics of the
analyzed sample
Header (severity) Severity 6 (fixed value)
cs1 Violated policy name Example: Suspicious network or
messaging activity
cs1Label Violated policy name PolicyCategory
cs2 Analysis violated event Example: Uses spoofed version
information
cs2Label Analysis violated event PolicyName
3-17
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
deviceExternalId Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
dvcmac Appliance MAC address Example: 00:0C:29:6E:CB:F9
fileHash SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
fileType True file type Example: WIN32 EXE
fname File name Example: excel.rar
fsize File size Example: 131372
msg Details Example: The file has no company
information.
rt Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200127|N
otable Characteristics of the analyzed sample|6|rt=Mar 11 20
15 05:00:26 GMT-04:00 dvc=10.201.156.143 dvchost=ddi38-143 d
vcmac=00:0C:29:A6:53:0C deviceExternalId=D2C1D6D20FF8-4FC98F
92-25EB-D7DA-AF0E fname=DTAS_WIN32_07 fileHash=672B1A8ADB412
C272CCA21A214732C447B650349 fileType=WIN32 EXE fsize=290304
cs1Label=PolicyCategory cs1=Deception, social engineering ms
g=The file has no company information. cs2Label=PolicyName c
s2=Uses spoofed version information
3-18
Syslog Content Mapping - CEF
CEF Virtual Analyzer Logs: Deny List Transaction
Events
Table 3-7. CEF Deny List Transaction Events
CEF Key Description Value
Header (logVer) CEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 200120
Header (eventName) Description Deny List updated
Header (severity) Severity 3 (fixed value)
act The action in the event Add or Remove
cs1 Type • Deny List IP/Port
• Deny List URL
• Deny List File SHA1
• Deny List Domain
cs1Label Type type
cs2 Risk level • Low
• Medium
• High
• Confirmed malware
cs2Label Risk level RiskLevel
deviceExternalId Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
3-19
Trend Micro Deep Discovery Inspector Syslog Guide
CEF Key Description Value
dhost Destination host name Example: iplasticalsex.ru
dpt Destination port Value between 0 and 65535
dst Destination IP address Example: 10.1.144.199
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
dvcmac Appliance MAC address Example: 00:0C:29:6E:CB:F9
end Report end time Example: Mar 09 2015 17:05:21 GMT
+08:00
fileHash SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
request URL Example: http://1.2.3.4/query?
term=value
rt Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200120|D
eny List updated|3|rt=Mar 11 2015 07:15:45 GMT-04:00 dvc=10.
201.156.143 dvchost=ddi38-143 dvcmac=00:0C:29:A6:53:0C devic
eExternalId=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF0E cs1Label=ty
pe cs1=Deny List Domain end=Apr 10 2015 07:15:35 GMT-04:00 a
ct=Add dhost=plasticalsex.ru cs2Label=RiskLevel cs2=Medium
3-20
Chapter 4
Syslog Content Mapping - LEEF
The following tables outline syslog content mapping between Deep
Discovery Inspector log output and LEEF syslog types:
• LEEF Threat Logs on page 4-2
• LEEF Disruptive Application Logs on page 4-9
• LEEF Web Reputation Logs on page 4-12
• LEEF System Logs on page 4-16
• LEEF Correlation Incident Logs on page 4-17
• LEEF Virtual Analyzer Logs: File Analysis Events on page 4-20
• LEEF Virtual Analyzer Logs: Notable Characteristics Events on page 4-22
Note
In LEEF log syntax, separate event attributes with a tab delimiter, <009>.
4-1
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF Threat Logs
Table 4-1. LEEF Threat Logs
LEEF Key Description Value
Header (logVer) LEEF format version LEEF: 1.0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventName) Event Name • MALWARE_DETECTION
• MALWARE_OUTBREAK_DETECT
ION
• SECURITY_RISK_DETECTION
act The action in the event blocked or not blocked
aggregatedCnt Aggregated count Example: 1
aptRelated Indicates an APT-related 0 or 1
event
botCommand BOT command Example: COMMIT
botUrl BOT URL Example: trend.com
cccaDestination CCCA address Example: 10.1.144.199
cccaDestinationFormat CCCA type • IP_DOMAIN
• IP_DOMAIN_PORT
• URL
• EMAIL
cccaDetection CCCA detection 0 or 1
4-2
Syslog Content Mapping - LEEF
LEEF Key Description Value
cccaDetectionSource CCCA log is detected by • GLOBAL_INTELLIGENCE
• VIRTUAL_ANALYZER
• USER_DEFINED
cccaRiskLevel CCCA Risk Level • 0: Unknown
• 1: Low
• 2: Medium
• 3: High
channelName Channel name Example: IRCChannel1
chatUserName Nickname Example: IRCUser1
cnt Total count Example: 1
compressedFileName File name in archive Example: mtxlegih.dll
detectionType Detection type • 0: Known detection
• 1: Unknown detection
• 2: OPS detection
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
deviceRiskConfidenceLeve Confidence level • 1: High
l
• 2: Medium
• 3: Low
• 0: Undefined
4-3
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF Key Description Value
devTime Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
devTimeFormat Time format MMM dd yyyy HH:mm:ss z
dhost Destination host name Example: dhost1
dOSName Destination host OS Example: Android
dst Destination IP address Example: 10.1.144.199
dstGroup Network Group assigned Example: monitor1
to a destination host
dstMAC Destination MAC Example: 00:0C:29:6E:CB:F9
dstPort Destination port Value between 0 and 65535
dstZone Destination zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
untrusted
duser Mail recipient Example: duser1
dUser1 Destination user name 1 Example: admin
dUser1LoginTime Destination user log on Example: Mar 09 2015 17:05:21 GMT
time 1 +08:00
dUser2 Destination user name 2 Example: admin
dUser2LoginTime Destination user log on Example: Mar 09 2015 17:05:21 GMT
time 2 +08:00
dUser3 Destination user name 3 Example: admin
dUser3LoginTime Destination user log on Example: Mar 09 2015 17:05:21 GMT
time 3 +08:00
dvc Appliance IP address Example: 10.1.144.199
4-4
Syslog Content Mapping - LEEF
LEEF Key Description Value
dvchost Appliance host name Example: localhost
evtCat Event category Example: Suspicious Traffic
evtSubCat Event subcategory Example: Email
fileHash SHA1 Example:1EDD5B38DE47295457670
88C5CAB395E4197C8F3
filePath File path Example: SHARE\\
fileType Real file type Example: 1638400
fname File name Example: excel.rar
fsize File size Example: 131372
hackerGroup Hacker group Example: Comment Crew
hackingCampaign Hacking campaign Example:Aurora
hostName Host name Example: CLIENT1
interestedIp Interested IP Example: 10.1.144.199
mailMsgSubject Mail subject Example: hello
malFamily Malware family Example:Duqu
malName Malware name Example: HEUR_NAMETRICK.A
malType Malware type Example: MALWARE
mitigationTaskId Event task ID for Example:
mitigation dc036acb-9a2e-4939-8244-
dedbda9ec4ba
msg Description Example: HEUR_NAMETRICK.A -
SMTP (Email)
oldFileHash Mail attachment SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
4-5
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF Key Description Value
oldFileName Mail attachment file name Example: excel.rar
oldFileSize Mail attachment file size Example: 150000
oldFileType Mail attachment file type Example: 1638400
pAttackPhase Primary attack phase • Intelligence Gathering
• Point of Entry
• Command and Control
Communication
• Lateral Movement
• Asset and Data Discovery
• Data Exfiltration
• Nil (no applicable attack phase)
pComp Detection engine/ Example: VSAPI
component
peerIP Peer IP Example: 10.1.144.199
proto Protocol Example: SMTP
protoGroup Protocol group Example: SMTP
ptype Application type IDS
requestClientApplication User agent Example: IE
riskType Potential risk • 0: Known risk
• 1: Potential risk
ruleId Rule ID Example: 52
sAttackPhase Secondary attack phase Example: Point of Entry
4-6
Syslog Content Mapping - LEEF
LEEF Key Description Value
sev Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
shost Source host name Example: shost1
sOSName Source host OS Example: Android
src Source IP address Example: 10.1.144.199
srcGroup Network Group assigned Example: monitor1
to a source host
srcMAC Source MAC Example: 00:0C:29:6E:CB:F9
srcPort Source port Value between 0 and 65535
srcZone Source zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
untrusted
suid User name Example: User1
suser Mail sender Example: suser1
sUser1 Source user name 1 Example: admin
sUser1LoginTime Source user log on time 1 Example: Mar 09 2015 17:05:21 GMT
+08:00
sUser2 Source user name 2 Example: admin
sUser2LoginTime Source user log on time 2 Example: Mar 09 2015 17:05:21 GMT
+08:00
sUser3 Source user name 3 Example: admin
4-7
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF Key Description Value
sUser3LoginTime Source user log on time 3 Example: Mar 09 2015 17:05:21 GMT
+08:00
threatType Threat type • 0: Malicious content
• 1: Malicious behavior
• 2: Suspicious behavior
• 3: Exploit
• 4: Grayware
url URL Example: http://1.2.3.4/query?
term=value
vLANId VLANID Value between 0 and 4095
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1175|SECUR
ITY_RISK_DETECTION|devTimeFormat=MMM dd yyyy HH:mm:ss z<009>
ptype=IDS<009>dvc=10.201.156.143<009>deviceMacAddress=00:0C:
29:A6:53:0C<009>dvchost=ddi38-143<009>deviceGUID=6B593E17AFB
7-40FBBB28-A4CE-0462-A536<009>devTime=Mar 09 2015 11:58:24 G
MT+08:00<009>sev=6<009>protoGroup=HTTP<009>proto=HTTP<009>vL
ANId=4095<009>deviceDirection=1<009>dhost=www.freewebs.com<0
09>dst=216.52.115.2<009>dstPort=80<009>dstMAC=00:1b:21:35:8b
:98<009>shost=172.16.1.197<009>src=172.16.1.197<009>srcPort=
12121<009>srcMAC=fe:ed:be:ef:5a:c6<009>malType=MALWARE<009>s
AttackPhase=Point of Entry<009>fname=setting.doc<009>fileTyp
e=0<009>fsize=0<009>ruleId=20<009>msg=HEUR_NAMETRIC
K.A - SMTP (Email)<009>deviceRiskConfidenceLevel=2
<009>url=http://www.freewebs.com/setting3/setting.doc
<009>pComp=CAV<009>riskType=1<009>
srcGroup=Default<009>srcZone=1<009>dstZone=0<009>dete
ctionType=1<009>act=not blocked<009>threatType=1<009>interes
4-8
Syslog Content Mapping - LEEF
tedIp=172.16.1.197<009>peerIp=216.52.115.2<009>hostName=www.
freewebs.com<009>cnt=1<009>aggregatedCnt=1<009>cccaDestinati
onFormat=URL<009>cccaDetectionSource=GLOBAL_INTELLIGENCE<009
>cccaRiskLevel=2<009>cccaDestination=http://www.freewebs.com
/setting3/setting.doc<009>cccaDetection=1<009>evtCat=Callbac
k evtSubCat=Bot<009>pAttackPhase=Command and Control Communi
cation
LEEF Disruptive Application Logs
Table 4-2. LEEF Disruptive Application Logs
LEEF Key Description Value
Header (logVer) LEEF format version LEEF: 1.0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventName) Event Name DISRUPTIVE_APPLICATION_DETECT
ION
aggregatedCnt AggrCount Example: 1
cnt Total count Example: 1
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
devTime Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
4-9
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF Key Description Value
devTimeFormat Time format MMM dd yyyy HH:mm:ss z
dhost Destination host name Example: dhost1
dOSName Destination host OS Example: Android
dst Destination IP address Example: 10.1.144.199
dstGroup Network Group assigned Example: monitor1
to a destination host
dstMAC Destination MAC Example: 00:0C:29:6E:CB:F9
dstPort Destination port Value between 0 and 65535
dstZone Destination zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
not trusted
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
interestedIp Interested IP Example: 10.1.144.199
msg Description Example: Deep Discovery Inspector
detected the protocol in your
monitored network
pComp Detection engine/ Example: VSAPI
component
peerIP Peer IP Example: 10.1.144.199
proto Protocol Example: SMTP
protoGroup Protocol group Example: SMTP
ptype Application type IDS
4-10
Syslog Content Mapping - LEEF
LEEF Key Description Value
sev Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
shost Source host name Example: shost1
sOSName Source host OS Example: Android
src Source IP address Example: 10.1.144.199
srcGroup Network Group assigned Example: monitor1
to a source host
srcMAC Source MAC Example: 00:0C:29:6E:CB:F9
srcPort Source port Value between 0 and 65535
srcZone Source zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
not trusted
threatType Threat type 6
vLANId VLANID Value between 0 and 4095
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1175|DISRU
PTIVE_APPLICATION_DETECTION|devTimeFormat=MMM dd yyyy HH:mm:
ss z<009>dvc=10.201.156.143<009>deviceMacAddress=00:0C:29:A6
:53:0C<009>dvchost=ddi38-143<009>deviceGUID=6B593E17AFB7-40F
4-11
Trend Micro Deep Discovery Inspector Syslog Guide
BBB28-A4CE-0462-A536<009>ptype=IDS<009>devTime=Mar 09 2015 1
4:20:38 GMT+08:00<009>sev=2<009>protoGroup=STREAMING<009>pro
to=WMSP<009>vLANId=4095<009>deviceDirection=1<009>dhost=12.1
90.48.13<009>dst=12.190.48.13<009>dstPort=80<009>dstMAC=00:1
7:9a:65:f3:05<009>shost=192.168.33.2<009>src=192.168.33.2<00
9>srcPort=35125<009>srcMAC=00:16:6f:a1:3d:7a<009>msg=Deep Di
scovery Inspector detected the protocol in your monitored ne
twork.<009>pComp=CAV<009>threatType=6<009>srcGroup=Default<0
09>srcZone=1<009>dstZone=0<009>interestedIp=192.168.33.2<009
>peerIp=12.190.48.13<009>cnt=1<009>aggregatedCnt=1
LEEF Web Reputation Logs
Table 4-3. LEEF Web Reputation Logs
LEEF Key Description Value
Header (logVer) LEEF format version LEEF: 1.0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventName) Event Name WEB_THREAT_DETECTION
cccaDetection CCCA detection 0 or 1
cccaDetectionSource CCCA log is detected by • GLOBAL_INTELLIGENCE
• VIRTUAL_ANALYZER
• USER_DEFINED
cccaRiskLevel CCCA Risk Level • 0: Unknown
• 1: Low
• 2: Medium
• 3: High
4-12
Syslog Content Mapping - LEEF
LEEF Key Description Value
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
devTime Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
devTimeFormat Time format MMM dd yyyy HH:mm:ss z
dhost Destination host name Example: dhost1
dOSName Destination host OS Example: Android
dst Destination IP address Example: 10.1.144.199
dstGroup Network Group assigned Example: monitor1
to a destination host
dstMAC Destination MAC Example: 00:0C:29:6E:CB:F9
dstPort Destination port Value between 0 and 65535
dstZone Destination zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
not trusted
duser Mail recipient Example: duser1
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
hostName Host name Example: CLIENT1
4-13
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF Key Description Value
interestedIp Interested IP Example: 10.1.144.199
mailMsgSubject Mail subject Example: hello
msg Description Example: Dangerous URL in Web
Reputation Services database -
HTTP (Request)
pComp Detection engine/ Example: VSAPI
component
peerIP Peer IP Example: 10.1.144.199
proto Protocol Example: SMTP
protoGroup Protocol group Example: SMTP
ptype Application type IDS
requestClientApplication User agent Example: IE
riskScore Score Example: 49
sev Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
shost Source host name Example: shost1
sOSName Source host OS Example: Android
src Source IP address Example: 10.1.144.199
srcGroup Network Group assigned Example: monitor1
to a source host
srcMAC Source MAC Example: 00:0C:29:6E:CB:F9
srcPort Source port Value between 0 and 65535
4-14
Syslog Content Mapping - LEEF
LEEF Key Description Value
srcZone Source zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
not trusted
suser Mail sender Example: suser1
threatType Threat type 5
url URL Example: http://1.2.3.4/query?
term=value
urlCat Category Example: Gambling
vLANId VLANID Value between 0 and 4095
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1175|WEB_T
HREAT_DETECTION|devTimeFormat=MMM dd yyyy HH:mm:ss z<009>dvc
=10.201.156.143<009>deviceMacAddress=00:0C:29:A6:53:0C<009>d
vchost=ddi38-143<009>deviceGUID=6B593E17AFB7-40FBBB28-A4CE-0
462-A536<009>ptype=IDS<009>devTime=Mar 09 2015 14:06:36 GMT+
08:00<009>sev=6<009>protoGroup=HTTP<009>proto=HTTP<009>vLANI
d=4095<009>deviceDirection=1<009>dhost=www.freewebs.com<009>
dst=216.52.115.2<009>dstPort=80<009>dstMAC=00:1b:21:35:8b:98
<009>shost=172.16.1.197<009>src=172.16.1.197<009>srcPort=121
21<009>srcMAC=fe:ed:be:ef:5a:c6<009>hostName=www.freewebs.co
m<009>msg=Dangerous URL in Web Reputation Services
database - HTTP (Request)<009>url=http:
//www.freewebs.com/setting3/setting.doc<009>
pComp=TMUFE<009>srcGroup=Default<009>
srcZone=1<009>dstZone=0<009>urlCat=
4-15
Trend Micro Deep Discovery Inspector Syslog Guide
Disease Vector<009>riskScore=49<009>threatTy
pe=5<009>interestedIp=172.16.1.197<009>
peerIp=216.52.115.2
LEEF System Logs
Table 4-4. LEEF System Logs
LEEF Key Description Value
Header (logVer) LEEF format version LEEF: 1.0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventName) Event Name • PRODUCT_UPDATE
• SYSTEM_EVENT
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
devTime Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
devTimeFormat Time format MMM dd yyyy HH:mm:ss z
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
msg Description Example: The system time setting
has been changed.
ptype Application type IDS
4-16
Syslog Content Mapping - LEEF
LEEF Key Description Value
sev Severity • 2: Informational
• 4: Warning
• 6: Severe
Example: 2
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1175|SYSTE
M_EVENT|dvc=10.201.156.143<009>deviceMacAddress=00:0C:29:A6:
53:0C<009>dvchost=ddi38-143<009>deviceGUID=6B593E17AFB7-40FB
BB28-A4CE-0462-A536<009>ptype=IDS<009>devTimeFormat=MMM dd y
yyy HH:mm:ss z<009>sev=2<009>msg=The system time setting has
been changed.<009>devTime=Mar 09 2015 16:46:08 GMT+08:00
LEEF Correlation Incident Logs
Table 4-5. LEEF Correlation Incident Logs
LEEF Key Description Value
Header (logVer) LEEF format version LEEF: 1.0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventName) Event Name SUSPICIOUS_BEHAVIOUR_DETECTI
ON
4-17
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF Key Description Value
data0 Correlation data 0 Additional attribute values
data1 Correlation data 1 Additional attribute values
data2 Correlation data 2 Additional attribute values
data3 Correlation data 3 Additional attribute values
data4 Correlation data 4 Additional attribute values
data5 Correlation data 5 Additional attribute values
data6 Correlation data 6 Additional attribute values
data7 Correlation data 7 Additional attribute values
data8 Correlation data 8 Additional attribute values
data9 Correlation data 9 Additional attribute values
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
devTime Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
devTimeFormat Time format MMM dd yyyy HH:mm:ss z
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
interestedHost Interested host name Example: trend.net
interestedIp Interested IP Example: 10.1.144.199
interestedMacAddress Interested MAC address Example: 00:0C:29:6E:CB:F9
4-18
Syslog Content Mapping - LEEF
LEEF Key Description Value
interestedUser Interested user name 1 Example: user1
interestedUser2 Interested user name 2 Example: user2
interestedUser3 Interested user name 3 Example: user3
pComp Detection engine/ Correlation
component
proto Protocol Example: SMTP
ptype Application type IDS
ruleId Rule ID Example: 52
ruleName Rule name Example: This host has responded
to DNS queries.
sev Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
threatName Threat name Example: Malicious Bot
threatType Threat type Example: Malware-related
userGroup User group Example: Default
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|SUSPI
CIOUS_BEHAVIOUR_DETECTION|devTimeFormat=MMM dd yyyy HH:mm:ss
z<009>deviceMacAddress=00:0C:29:A6:53:0C<009>dvchost=ddi38-
143<009>pComp=Correlation<009>dvc=10.201.156.143<009>ptype=I
4-19
Trend Micro Deep Discovery Inspector Syslog Guide
DS<009>deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF0E<009>d
evTime=Mar 11 2015 22:05:50 GMT-04:00<009>sev=2<009>interest
edIp=172.16.0.100<009>interestedHost=172.16.0.100<009>intere
stedMacAddress=00:0c:29:70:45:...36<009>ruleId=47<009>ruleNa
me=This host has responded to DNS queries.<009>threatType=Un
registered Service<009>threatName=Unregistered DNS Server<00
9>proto=DNS Response<009>userGroup=Default<009>deviceDirecti
on=1
LEEF Virtual Analyzer Logs: File Analysis Events
Table 4-6. LEEF File Analysis Events
LEEF Key Description Value
Header (logVer) LEEF format version LEEF: 1.0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventName) Event Name FILE_ANALYZED
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
deviceOSName Sandbox image type SandboxImageType
deviceProcessHash Parent SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
devTime Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
devTimeFormat Time format MMM dd yyyy HH:mm:ss z
dvc Appliance IP address Example: 10.1.144.199
4-20
Syslog Content Mapping - LEEF
LEEF Key Description Value
dvchost Appliance host name Example: localhost
fileHash File SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
fileType True file type Example: WIN32 EXE
fname File name Example: excel.rar
fsize File size Example: 131372
gridIsKnownGood GRID is known good • 0: Bad file
• -1: Unknown file
• 1: Good file
malName Virus name Example: HEUR_NAMETRICK.A
pcapReady PCAP ready Example: 1
pComp Detection source • Sandbox
• UDSO (User-Defined Suspicious
Objects)
rozRating ROZ rating • 0: No risk
• 1: Low risk
• 2: Medium risk
• 3: High risk
sev Severity 3 (fixed value)
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-21
Trend Micro Deep Discovery Inspector Syslog Guide
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|FILE_
ANALYZED|devTime=Mar 11 2015 07:36:27 GMT-04:00<009>devTimeF
ormat=MMM dd yyyy HH:mm:ss z<009>sev=3<009>pComp=Sandbox<009
>dvc=10.201.156.143<009>dvchost=ddi38-143<009>deviceMacAddre
ss=00:0C:29:A6:53:0C<009>deviceGUID=D2C1D6D20FF8-4FC98F92-25
EB-D7DA-AF0E<009>fname=mwsoemon.exe<009>fileHash=89DE67C5220
91EE259533D9CBDDF37DDB8C8D636<009>malName=Possible_Virus<009
>fileType=WIN32 EXE<009>fsize=59392<009>deviceOSName=MAK_win
7sp1en_offices_noab_TL<009>gridIsKnownGood=-1<009>rozRating=
1<009>pcapReady=1
LEEF Virtual Analyzer Logs: Notable Characteristics
Events
Table 4-7. LEEF Notable Characteristics Events
LEEF Key Description Value
Header (logVer) LEEF format version LEEF: 1.0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventName) Event Name NOTABLE_CHARACTERISTICS
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
deviceOSName Sandbox image type Example: win7
devTime Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
devTimeFormat Time format MMM dd yyyy HH:mm:ss z
dvc Appliance IP address Example: 10.1.144.199
4-22
Syslog Content Mapping - LEEF
LEEF Key Description Value
dvchost Appliance host name Example: localhost
fileHash File SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
fileType True file type Example: WIN32 EXE
fname File name Example: excel.rar
fsize File size Example: 131372
msg Details Example:
www.chapisteriadaniel.com
pComp Detection source Sandbox
ruleCategory Violated policy name Example: Internet Explorer Setting
Modification
ruleName Analysis violated event Example: Modified important
registry items
sev Severity 6 (fixed value)
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|NOTAB
LE_CHARACTERISTICS|devTime=Mar 11 2015 05:00:26 GMT-04:00<00
9>devTimeFormat=MMM dd yyyy HH:mm:ss z<009>sev=6<009>pComp=S
andbox<009>dvc=10.201.156.143<009>dvchost=ddi38-143<009>devi
ceMacAddress=00:0C:29:A6:53:0C<009>deviceGUID=D2C1D6D20FF8-4
FC98F92-25EB-D7DA-AF0E<009>fname=DTAS_WIN32_07<009>fileHash=
672B1A8ADB412C272CCA21A214732C447B650349<009>fileType=WIN32
EXE<009>fsize=290304<009>ruleCategory=Suspicious network or
messaging activity<009>ruleName=Queries DNS server<009>msg=0
4-23
Trend Micro Deep Discovery Inspector Syslog Guide
12webpages.com<009>deviceOSName=MAK_win7sp1en_offices_noab_T
L
LEEF Virtual Analyzer Logs: Deny List Transaction
Event
Table 4-8. LEEF Deny List Transaction Events
LEEF Key Description Value
Header (logVer) LEEF format version LEEF: 1.0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventName) Event Name DENYLIST_CHANGE
act The action in the event • Add
• Remove
deviceExternalRiskType Risk level • Low
• Medium
• High
• Confirmed malware
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
devTime Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
devTimeFormat Time format MMM dd yyyy HH:mm:ss z
dhost Destination host name Example: insta-find.com
4-24
Syslog Content Mapping - LEEF
LEEF Key Description Value
dpt Remote port Value between 0 and 65535
dst Remote IP Example: 10.1.144.199
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
end Report end time Example: Mar 09 2015 17:05:21 GMT
+08:00
fileHash File SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
pComp Detection source Sandbox
sev Severity 3 (fixed value)
type Deny List type • Deny List IP/Port
• Deny List URL
• Deny List File SHA1
• Deny List Domain
url URL Example: http://1.2.3.4/
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|DENYL
IST_CHANGE|devTime=Mar 11 2015 05:00:42 GMT-04:00<009>devTim
eFormat=MMM dd yyyy HH:mm:ss z<009>sev=3<009>pComp=Sandbox<0
09>dvc=10.201.156.143<009>dvchost=ddi38-143<009>deviceMacAdd
ress=00:0C:29:A6:53:0C<009>deviceGUID=D2C1D6D20FF8-4FC98F92-
25EB-D7DA-AF0E<009>end=Apr 10 2015 05:00:26 GMT-04:00<009>ac
4-25
Trend Micro Deep Discovery Inspector Syslog Guide
t=Add<009>dhost=ourdatatransfers.com<009>deviceExternalRiskT
ype=High<009>type=Deny List Domain
4-26
Chapter 5
Syslog Content Mapping - TMEF
The following tables outline syslog content mapping between Deep
Discovery Inspector log output and TMEF syslog types:
• TMEF Threat Logs on page 5-2
• TMEF Disruptive Application Logs on page 5-11
• TMEF Web Reputation Logs on page 5-15
• TMEF System Logs on page 5-20
• TMEF Correlated Incident Logs on page 5-22
• TMEF Virtual Analyzer Logs: File Analysis Events on page 5-24
• TMEF Virtual Analyzer Logs: Notable Characteristics Events on page 5-26
• TMEF Virtual Analyzer Logs: Deny List Transaction Events on page 5-28
5-1
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Threat Logs
Table 5-1. TMEF Threat Logs
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Event ID • 100100
• 100118
• 100119
Header (eventName) Event Name • MALWARE_DETECTION
• MALWARE_OUTBREAK_DETECT
ION
• SECURITY_RISK_DETECTION
Header (severity) Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
act The action in the event blocked or not blocked
app Protocol Example: HTTP
appGroup Protocol group Example: HTTP
compressedFileHash Compressed file SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
compressedFileName File name in archive Example: mtxlegih.dll
5-2
Syslog Content Mapping - TMEF
TMEF Key Description Value
compressedFileType Compressed file type Example: 0
cnt Total count Example: 1
cn1 CCCA detection 0 or 1
cn1Label CCCA detection CCCA_Detection
cn2 Indicates an APT-related 0 or 1
event
cn2Label Indicates an APT-related APT Related
event
cn3 Potential risk • 0: Known risk
• 1: Potential risk
cn3Label Potential risk Deep Discovery_PotentialRisk
cn4 Threat type • 0: Malicious content
• 1: Malicious behavior
• 2: Suspicious behavior
• 3: Exploit
• 4: Grayware
cn4Label Threat type Deep Discovery_ThreatType
cn5 Aggregated count Example: 1
cn5Label Aggregated count AggregatedCnt
cn6 CCCA Risk Level • 0: Unknown
• 1: Low
• 2: Medium
• 3: High
cn6Label CCCA Risk Level CCCA_RiskLevel
5-3
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
cn7 Heuristic flag • 0: Non-heuristic detection
• 1: Heuristic detection
cn7Label Heuristic flag HeurFlag
cs1 Channel name Example: IRCChannel1
cs1Label Channel name IRCChannelName
cs2 Nickname Example: IRCUser1
cs2Label Nickname IRCUserName
cs3 Host name Example: CLIENT1
cs3Label Host name HostName_Ext
cs4 Network Group assigned Example: monitor1
to a source host
cs4Label Network Group assigned Deep Discovery_SrcGroup
to a source host
cs5 Source zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
untrusted
cs5Label Source zone Deep Discovery_SrcZone
cs6 Detection type • 0: Known detection
• 1: Unknown detection
• 2: OPS detection
cs6Label Detection type Deep Discovery_DetectionType
cs7 BOT command Example: COMMIT
cs7Label BOT command BOT_CMD
5-4
Syslog Content Mapping - TMEF
TMEF Key Description Value
cs8 BOT url Example: trend.com
cs8Label BOT url BOT_URL
cs9 Network Group assigned Example: monitor1
to a destination host
cs9Label Network Group assigned Deep Discovery_DstGroup
to a destination host
cs10 Destination zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
untrusted
cs10Label Destination zone Deep Discovery_DstZone
cs11 CCCA log is detected by • GLOBAL_INTELLIGENCE
• VIRTUAL_ANALYZER
• USER_DEFINED
• RELEVANCE_RULE
cs11Label CCCA log is detected by CCCA_DetectionSource
cs12 CCCA address Example: 10.1.144.199
cs12Label CCCA address CCCA_Destination
cs13 CCCA type • IP_DOMAIN
• IP_DOMAIN_PORT
• URL
• EMAIL
cs13Label CCCA type CCCA_DestinationFormat
5-5
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
devicePayloadId An extendable field. Examples:
Format: {threat_type}: • With pcap file captured:
{log_id}:{with pcap file 2:10245:P
captured}{:extensions}*
• Without pcap file captured:
2:10245:
deviceRiskConfidenceLeve Confidence level • 1: High
l
• 2: Medium
• 3: Low
• 0: Undefined
dhost Destination host name Example: dhost1
dmac Destination MAC Example: 00:0C:29:6E:CB:F9
dOSName Destination host OS Example: Android
dpt Destination port Value between 0 and 65535
dst Destination IP address Example: 10.1.144.199
duser Mail recipient Example: duser1
dUser1 Destination user name 1 Example: admin
dUser1LoginTime Destination user log on Example: Mar 09 2015 17:05:21 GMT
time 1 +08:00
dUser2 Destination user name 2 Example: admin
5-6
Syslog Content Mapping - TMEF
TMEF Key Description Value
dUser2LoginTime Destination user log on Example: Mar 09 2015 17:05:21 GMT
time 2 +08:00
dUser3 Destination user name 3 Example: admin
dUser3LoginTime Destination user log on Example: Mar 09 2015 17:05:21 GMT
time 3 +08:00
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
evtCat Event category Example: Suspicious Traffic
evtSubCat Event sub category Example: Email
externalId Log ID Example: 11
fileHash SHA1 Example:1EDD5B38DE47295457670
88C5CAB395E4197C8F3
filePath File path Example: SHARE\\
fileType Real file type Example: 1638400
fname File name Example: excel.rar
fsize File size Example: 131372
hackerGroup Hacker group Example: Comment Crew
hackingCampaign Hacking campaign Example: Aurora
hostSeverity Host Severity Example: 4
interestedIp Interested IP Example: 10.1.144.199
mailMsgSubject Mail subject Example: hello
malFamily Malware family Example: Duqu
malName Malware name Example: HEUR_NAMETRICK.A
malType Malware type Example: MALWARE
5-7
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
messageId Message ID Example:
<20090130042416.7060505@jovenci
tasvirgenes.com.ar>
mitigationTaskId Event task ID for Example:
mitigation dc036acb-9a2e-4939-8244-
dedbda9ec4ba
oldFileHash Mail attachment SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
oldFileName Mail attachment file name Example: excel.rar
oldFileSize Mail attachment file size Example: 150000
oldFileType Mail attachment file type Example: 1638400
pAttackPhase Primary attack phase • Intelligence Gathering
• Point of Entry
• Command and Control
Communication
• Lateral Movement
• Asset and Data Discovery
• Data Exfiltration
• Nil (no applicable attack phase)
pComp Detection engine/ Example: VSAPI
component
peerIP Peer IP Example: 10.1.144.199
ptype Application type IDS
reason Reason Example: ["Protocol: 4"]
request URL Example: http://1.2.3.4/query?
term=value
5-8
Syslog Content Mapping - TMEF
TMEF Key Description Value
requestClientApplication User agent Example: IE
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
ruleId Rule ID Example: 52
ruleName Description Example: Email message sent
through an unregistered SMTP
server
sAttackPhase Secondary attack phase • Intelligence Gathering
• Point of Entry
• Command and Control
Communication
• Lateral Movement
• Asset and Data Discovery
• Data Exfiltration
• Nil (no applicable attack phase)
shost Source host name Example: shost1
smac Source MAC Example: 00:0C:29:6E:CB:F9
sOSName Source host OS Example: Android
spt Source port Value between 0 and 65535
src Source IP address Example: 10.1.144.199
suid User name Example: User1
suser Mail sender Example: suser1
sUser1 Source user name 1 Example: admin
sUser1LoginTime Source user log on time1 Example: Mar 09 2015 17:05:21 GMT
+08:00
sUser2 Source user name 2 Example: admin
5-9
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
sUser2LoginTime Source user log on time 2 Example: Mar 09 2015 17:05:21 GMT
+08:00
sUser3 Source user name 3 Example: admin
sUser3LoginTime Source user log on time 3 Example: Mar 09 2015 17:05:21 GMT
+08:00
vLANId VLANID Value between 0 and 4095
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|
5.0.1329|100100|
MALWARE_DETECTION|8| ptype=IDS dvc=172.22.9.32
deviceMacAddress=00:50:56:AD:03:BD dvchost=localhost
deviceGUID=E9A3FA433916-4738984C-A4BF-84A0-D603
rt=Jun 22 2017 09:42:47 GMT+08:00 appGroup=HTTP
app=HTTP vLANId=4095 deviceDirection=1 dhost=172.22.9.5
dst=172.22.9.5 dpt=57908 dmac=00:50:56:82:e7:a9
shost=172.22.9.54 src=172.22.9.54 spt=80
smac=00:50:56:82:c6:ae
cs3Label=HostName_Ext cs3=172.22.9.54
malName=Eicar_test_file
malType=Virus fname=eicarcom2.zip fileType=262340608
fsize=308 ruleId=0 ruleName=Eicar_test_file -
HTTP (Response) deviceRiskConfidenceLevel=0 cn3Label=Deep
Discovery_PotentialRisk cn3=0 cs4Label=Deep
Discovery_SrcGroup
cs4=Default cs5Label=Deep Discovery_SrcZone cs5=1
cs9Label=Deep Discovery_DstGroup cs9=Default
cs10Label=Deep
Discovery_DstZone cs10=1 cs6Label=Deep
Discovery_DetectionType
cs6=0 request=http://172.22.9.54/eicarcom2.zip
requestClientApplication=Wget/1.12 (linux-gnu)
pComp=VSAPI act=not blocked cn4Label=Deep
Discovery_ThreatType
cn4=0 peerIp=172.22.9.5
fileHash=BEC1B52D350D721C7E22A6D4BB0A92909893A3AE
5-10
Syslog Content Mapping - TMEF
compressedFileName=eicar.com interestedIp=172.22.9.54
cnt=1 dOSName=Linux cn5Label=AggregatedCount
cn5=1 evtCat=Malware evtSubCat=Trojan cn2Label=APT
Related cn2=0 pAttackPhase=Point of Entry externalId=143
cn7Label=HeurFlag cn7=0 compressedFileType=327680
compressedFileHash=3395856CE81F2B7382DEE72602F
798B642F14140 hostSeverity=8 reason=["Malware:
Eicar_test_file"] devicePayloadId=0:143:P
TMEF Disruptive Application Logs
Table 5-2. TMEF Disruptive Application Logs
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 100120
Header (eventName) Event Name DISRUPTIVE_APPLICATION_DETECT
ION
Header (severity) Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
app Protocol Example: HTTP
appGroup Protocol group Example: HTTP
cnt Total count Example: 1
5-11
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
cn4 Threat type 6
cn4Label Threat type Deep Discovery_ThreatType
cn5 Aggregated count Example: 1
cn5Label Aggregated count AggregatedCnt
cs4 Network Group assigned Example: monitor1
to a source host
cs4Label Network Group assigned Deep Discovery_SrcGroup
to a source host
cs5 Source zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
not trusted
cs5Label Source zone Deep Discovery_SrcZone
cs9 Network Group assigned Example: monitor1
to a destination host
cs9Label Network Group assigned Deep Discovery_DstGroup
to a destination host
cs10 Destination zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
not trusted
cs10Label Destination zone Deep Discovery_DstZone
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
5-12
Syslog Content Mapping - TMEF
TMEF Key Description Value
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
devicePayloadId An extendable field. Examples:
Format: {threat_type}: • With pcap file captured:
{log_id}:{with pcap file 2:10245:P
captured}{:extensions}*
• Without pcap file captured:
2:10245:
dhost Destination host name Example: dhost1
dmac Destination MAC Example: 00:0C:29:6E:CB:F9
dOSName Destination host OS Example: Android
dpt Destination port Value between 0 and 65535
dst Destination IP address Example: 10.1.144.199
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
externalId Log ID Example: 11
interestedIp Interested IP Example: 10.1.144.199
msg Description Example: Deep Discovery Inspector
detected the protocol in your
monitored network.
pComp Detection engine/ Example: VSAPI
component
peerIP Peer IP Example: 10.1.144.199
ptype Application type IDS
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
5-13
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
shost Source host name Example: shost1
smac Source MAC Example: 00:0C:29:6E:CB:F9
sOSName Source host OS Example: Android
spt Source port Value between 0 and 65535
src Source IP address Example: 10.1.144.199
vLANId VLANID Value between 0 and 4095
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|5.0.1329|
100120|
DISRUPTIVE_APPLICATION_DETECTION|2|dvc=172.22.9.32
deviceMacAddress=00:50:56:AD:03:BD dvchost=localhost
deviceGUID=E9A3FA433916-4738984C-A4BF-84A0-D603
ptype=IDS rt=Jun 22 2017 10:06:24 GMT+08:00 appGroup=P2P
app=eDonkey vLANId=4095 deviceDirection=1
dhost=10.1.100.223
dst=10.1.100.223 dpt=4662 dmac=00:0c:29:a7:72:74
shost=10.1.117.231 src=10.1.117.231 spt=39933
smac=00:30:da:2d:47:32 cn5Label=AggregatedCount
cn5=1 msg=Deep Discovery Inspector detected the
protocol in your monitored network. cn4Label=Deep
Discovery_ThreatType cn4=6 cs4Label=Deep
Discovery_SrcGroup
cs4=Default cs5Label=Deep Discovery_SrcZone cs5=1
cs9Label=Deep Discovery_DstGroup cs9=Default
cs10Label=Deep
Discovery_DstZone cs10=1 interestedIp=10.1.117.231
peerIp=10.1.100.223 pComp=CAV cnt=1 externalId=11
devicePayloadId=6:11:
5-14
Syslog Content Mapping - TMEF
TMEF Web Reputation Logs
Table 5-3. TMEF Web Reputation Logs
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 100101
Header (eventName) Event Name WEB_THREAT_DETECTION
Header (severity) Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
app Protocol Example: HTTP
appGroup Protocol group Example: HTTP
cn1 CCCA detection 0 or 1
cn1Label CCCA detection CCCA_Detection
cn2 Score Example: 49
cn2Label Score Score
cn4 Threat type 5
cn4Label Threat type Deep Discovery_ThreatType
5-15
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
cn6 CCCA Risk Level • 0: Unknown
• 1: Low
• 2: Medium
• 3: High
cn6Label CCCA Risk Level CCCA_RiskLevel
cs3 Host name Example: CLIENT1
cs3Label Host name HostName_Ext
cs4 Network Group assigned Example: monitor1
to a source host
cs4Label Network Group assigned Deep Discovery_SrcGroup
to a source host
cs5 Source zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
not trusted
cs5Label Source zone Deep Discovery_SrcZone
cs9 Network Group assigned Example: monitor1
to a destination host
cs9Label Network Group assigned Deep Discovery_DstGroup
to a destination host
cs10 Destination zone • 0: Not in monitored network
• 1: In monitored network and
trusted
• 2: In monitored network and
not trusted
cs10Label Destination zone Deep Discovery_DstZone
5-16
Syslog Content Mapping - TMEF
TMEF Key Description Value
cs11 CCCA log is detected by • GLOBAL_INTELLIGENCE
• VIRTUAL_ANALYZER
• USER_DEFINED
• RELEVANCE_RULE
cs11Label CCCA log is detected by CCCA_DetectionSource
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
devicePayloadId An extendable field. Examples:
Format: {threat_type}: • With pcap file captured:
{log_id}:{with pcap file 2:10245:P
captured}{:extensions}*
• Without pcap file captured:
2:10245:
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
dhost Destination host name Example: 'dhost1
dmac Destination MAC Example: 00:0C:29:6E:CB:F9
dOSName Destination host OS Example: Android
dpt Destination port Value between 0 and 65535
dst Destination IP address Example: 10.1.144.199
duser Mail recipient Example: duser1
externalId Log ID Example: 11
5-17
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
hostSeverity Host Severity Example: 4
interestedIp Interested IP Example: 10.1.144.199
mailMsgSubject Mail subject Example: hello
msg Description Example: C&C Server URL in Web
Reputation Services database -
HTTP (Request)
pAttackPhase Primary attack phase • Intelligence Gathering
• Point of Entry
• Command and Control
Communication
• Lateral Movement
• Asset and Data Discovery
• Data Exfiltration
• Nil (no applicable attack phase)
pComp Detection engine/ Example: VSAPI
component
peerIp Peer IP Example: 10.1.144.199
ptype Application type IDS
reason Reason Example: ["Protocol: 4"]
request URL Example: http://1.2.3.4/query?
term=value
requestClientApplication User agent Example: IE
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
sAttackPhase Secondary attack phase Example: Point of Entry
shost Source host name Example: shost1
5-18
Syslog Content Mapping - TMEF
TMEF Key Description Value
smac Source MAC Example: 00:0C:29:6E:CB:F9
sOSName Source host OS Example: Android
spt Source port Value between 0 and 65535
src Source IP address Example: 10.1.144.199
suser Mail sender Example: suser1
urlCat URL category Example: C&C Server
vLANId VLANID Value between 0 and 4095
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|5.0.1329|
100101|WEB_THREAT_DETECTION|8|dvc=172.22.9.32
deviceMacAddress=00:50:56:AD:03:BD dvchost=localhost
deviceGUID=E9A3FA433916-4738984C-A4BF-84A0-D603
ptype=IDS rt=Jun 22 2017 10:00:17 GMT+08:00
cs3Label=HostName_Ext
cs3=ca95-1.winshipway.com cs4Label=Deep
Discovery_SrcGroup
cs4=Default cs5Label=Deep Discovery_SrcZone cs5=1
cs10Label=Deep Discovery_DstZone cs10=0 cn2Label=Score
cn2=49 cn4Label=Deep Discovery_ThreatType cn4=5
dmac=00:16:c8:65:98:d5 shost=172.22.9.5 src=172.22.9.5
spt=41757 smac=00:50:56:82:e7:a9 interestedIp=172.22.9.5
cn1Label=CCCA_Detection cn1=1 msg=Ransomware URL
in Web Reputation Services database - HTTP (Request)
request=http://ca95-1.winshipway.com/
requestClientApplication=Wget/1.12
(linux-gnu) pComp=TMUFE appGroup=HTTP app=HTTP
vLANId=4095 deviceDirection=1 dhost=150.70.162.115
dst=150.70.162.115 dpt=80 urlCat=Ransomware
peerIp=150.70.162.115
sOSName=Linux cn6Label=CCCA_RiskLevel cn6=3
cs11Label=CCCA_DetectionSource
cs11=RELEVANCE_RULE externalId=17 hostSeverity=8
reason=["URL: http://ca95-1.winshipway.com/"]
5-19
Trend Micro Deep Discovery Inspector Syslog Guide
pAttackPhase=Command and Control Communication
devicePayloadId=5:17:P
TMEF System Logs
Table 5-4. TMEF System Logs
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID • 300102
• 300999
Header (eventName) Event Name • PRODUCT_UPDATE
• SYSTEM_EVENT
• PRODUCT_UPDATE
Header (severity) Severity • 2: Informational
• 4: Warning
• 6: Severe
Example: 2
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
duser Action by Example: admin
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
5-20
Syslog Content Mapping - TMEF
TMEF Key Description Value
engType Engine name Example: Advanced Threat Scan
Engine for Deep Discovery (Linux,
64-bit)
engVer Engine version Example: 10.300.1040
msg Description Example: The web console timeout
setting has been changed.
outcome Outcome • Success
• Failure
Example: Success
patType Pattern name Example: Deep Discovery Malware
Pattern
patVer Pattern version Example: 14.271.92
ptype Application type IDS
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
src User IP address Example: 10.1.1.1
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector
|3.85.1156|300999|SYSTEM_EVENT|2|ptype=IDS
dvc=172.22.9.12 deviceMacAddress=00:50:56:
AD:CC:EE dvchost=localhostdeviceGUID=
DBD38FFC70B4-41C792BE-D671-0040-8B1D
rt=Mar 10 2017 17:03:31 GMT+08:00
msg=The threat detection setting
has been changed. duser=admin
outcome=Success src=172.17.0.250
5-21
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Correlated Incident Logs
Table 5-5. Correlation Incident Logs
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 100127
Header (eventName) Event Name SUSPICIOUS_BEHAVIOUR_DETECTI
ON
Header (severity) Severity • 2: Informational
• 4: Low
• 6: Medium
• 8: High
app Protocol Example: HTTP
cs1 Interested group Example: Default
cs1Label Interested group DD_InterestedGroup
cs2 Malware server address Example: 10.1.144.199
cs2Label Malware server address Malware_Server_IP_Address
cs3 Number of downloaded Example: 1
malware files
cs3Label Number of downloaded Number_of_Malware_Files_Downlo
malware files aded
cs10 Malware name Example: HEUR_NAMETRICK.A
cs10Label Malware name Malware_Name
5-22
Syslog Content Mapping - TMEF
TMEF Key Description Value
deviceDirection Packet direction • 0: Source is external
• 1: Source is internal
• 2: Unknown
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
interestedHost Interested host Example: trend.net
interestedIp Interested IP Example: 10.1.144.199
interestedMacAddress Interested MAC Example: 00:0C:29:6E:CB:F9
interestedUser Interested user 1 Example: user1
interestedUser2 Interested user 2 Example: user2
interestedUser3 Interested user 3 Example: user3
pComp Detection engine/ Correlation
component
peerHost Peer host Example: 10.1.144.199
peerIp Peer IP Example: 10.1.144.199
ptype Application type IDS
rt Log generation time Example: Mar 09 2015 17:05:21 GMT
+08:00
ruleId Rule ID Example: 52
ruleName Description Example: Email message sent
through an unregistered SMTP
server
5-23
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
threatName Threat name Example: Malware File Downloaded
threatType Threat type Example: Malware-related
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|100127|S
USPICIOUS_BEHAVIOUR_DETECTION|2|dvc=10.201.156.143 deviceMac
Address=00:0C:29:A6:53:0C dvchost=ddi38-143 pComp=Correlatio
n ptype=IDS deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF0E
rt=Mar 11 2015 22:05:50 GMT-04:00 deviceDirection=1 interest
edIp=172.16.0.100 interestedHost=172.16.0.100 interestedMacA
ddress=00:0c:29:70:45:36 ruleId=47 ruleName=This host has re
sponded to DNS queries. threatType=Unregistered Service thre
atName=Unregistered DNS Server app=DNS Response cs1Label=DD_
InterestedGroup cs1=Default peerHost=172.16.1.141 peerIp=172
.16.1.141
TMEF Virtual Analyzer Logs: File Analysis Events
Table 5-6. TMEF File Analysis Events
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 200119
Header (eventName) Event Name FILE_ANALYZED
Header (severity) Severity 3 (fixed value)
5-24
Syslog Content Mapping - TMEF
TMEF Key Description Value
cn1 GRID is known good • 0: Bad file
• -1: Unknown file
• 1: Good file
cn1Label GRID is known good GRIDIsKnownGood
cn2 ROZ rating • 0: No risk
• 1: Low risk
• 2: Medium risk
• 3: High risk
cn2Label ROZ rating ROZRating
cn3 PCAP ready 0 or 1
cn3Label PCAP ready PcapReady
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
deviseOSName Sandbox image type Example: win7
deviceProcessHash Parent SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
fileHash File SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
fileType True file type Example: 1638400
fname File name Example: excel.rar
fsize File size Example: 131372
5-25
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
pComp Detection source • Sandbox
• UDSO (User-Defined Suspicious
Objects)
rt Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200119|F
ILE_ANALYZED|3|rt=Mar 11 2015 07:38:04 GMT-04:00 pComp=Sandb
ox dvc=10.201.156.143 dvchost=ddi38-143 deviceMacAddress=00:
0C:29:A6:53:0C deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF
0E fname=multiple_mask.swf fileHash=643DBF968EF3BECD9A73CF1D
CF44006BC46E15F7 malName=SWF_Lfm.926 fileType=Macromedia Fla
sh fsize=9400 deviceOSName=MAK_win7sp1en_offices_noab_TL cn2
Label=ROZRating cn2=3 cn1Label=GRIDIsKnownGood cn1=-1 cn3Lab
el=PcapReady cn3=1
TMEF Virtual Analyzer Logs: Notable
Characteristics Events
Table 5-7. TMEF Notable Characteristics Events
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 200127
Header (eventName) Event Name NOTABLE_CHARACTERISTICS
5-26
Syslog Content Mapping - TMEF
TMEF Key Description Value
Header (severity) Severity 6 (fixed value)
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
deviceOSName Sandbox image type Example: win7
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
fileHash File SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
fileType True file type Example: 1638400
fname File name Example: excel.rar
fsize File size Example: 131372
msg Details Example:
www.chapisteriadaniel.com
pComp Detection source Sandbox
rt Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
ruleCategory Violated policy name Example: Internet Explorer Setting
Modification
ruleName Analysis violated event Example: Modified important
registry items
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200127|N
OTABLE_CHARACTERISTICS|6|rt=Mar 11 2015 05:00:26 GMT-04:00 p
Comp=Sandbox dvc=10.201.156.143 dvchost=ddi38-143 deviceMacA
ddress=00:0C:29:A6:53:0C deviceGUID=D2C1D6D20FF8-4FC98F92-25
EB-D7DA-AF0E fname=DTAS_WIN32_07 fileHash=672B1A8ADB412C272C
5-27
Trend Micro Deep Discovery Inspector Syslog Guide
CA21A214732C447B650349 fileType=WIN32 EXE fsize=290304 ruleC
ategory=Suspicious network or messaging activity ruleName=Qu
eries DNS server msg=012webpages.com deviceOSName=MAK_win7sp
1en_offices_noab_TL
TMEF Virtual Analyzer Logs: Deny List Transaction
Events
Table 5-8. TMEF Deny List Transaction Events
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 200120
Header (eventName) Event Name DENYLIST_CHANGE
Header (severity) Severity 3 (fixed value)
act The action in the event Add or Remove
cs1 Deny List type • Deny List IP/Port
• Deny List URL
• Deny List File SHA1
• Deny List Domain
cs1Label Deny List type type
5-28
Syslog Content Mapping - TMEF
TMEF Key Description Value
deviceExternalRiskType Risk level • Low
• Medium
• High
• Confirmed malware
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
deviceMacAddress Appliance MAC address Example: 00:0C:29:6E:CB:F9
dhost Destination host name Example: insta-find.com
dpt Remote port Value between 0 and 65535
dst Remote IP Example: 10.1.144.199
dvc Appliance IP address Example: 10.1.144.199
dvchost Appliance host name Example: localhost
end Report end time Example: Mar 09 2015 17:05:21 GMT
+08:00
fileHash File SHA1 Example:
1EDD5B38DE4729545767088C5CAB
395E4197C8F3
pComp Detection source Sandbox
request URL Example: _http://1.2.3.4/query?
term=value
rt Analysis time Example: Mar 09 2015 17:05:21 GMT
+08:00
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200120|D
ENYLIST_CHANGE|3|rt=Mar 11 2015 07:15:45 GMT-04:00 pComp=San
dbox dvc=10.201.156.143 dvchost=ddi38-143 deviceMacAddress=0
0:0C:29:A6:53:0C deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-
AF0E cs1Label=type cs1=Deny List URL end=Apr 10 2015 07:15:3
5-29
Trend Micro Deep Discovery Inspector Syslog Guide
5 GMT-04:00 act=Add request=http://zalepivmordu.ru:80/ devic
eExternalRiskType=Medium
TMEF Retro Scan Report Logs
Table 5-9. TMEF Retro Scan Report Logs
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 100133
Header (eventName) Event Name RETROSCAN_REPORT
Header (severity) Severity 8
callback_attempt_num Number of callback Example: 20
attempts
cnc_host_num Number of C&C hosts Example: 1
compromised_client_num Number of compromised Example: 1
clients
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
firstCallbackTime First callback time Example: Mar 09 2015 17:05:21 GMT
+08:00
lastCallbackTime Last callback time Example: Mar 09 2015 17:05:21 GMT
+08:00
report_id Report ID Example: 74c15fe0-90c9-446b-
abc4-379d6d7213e7
5-30
Syslog Content Mapping - TMEF
TMEF Key Description Value
report_ts Report time Example: Mar 09 2015 17:05:21 GMT
+08:00
report_url Report URL Example: https://
retroscan.trendmicro.com/
retroscan/scanDetails.html?
reportID\=1e84c77b-0452-4f00-
b5b8-e41c0ea9ef1a &reportType
\=standard
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1200|100133|R
ETROSCAN_REPORT|8|guid=906A61690458-4099A441-898C-BDD2-C7C1
report_ts=Mar 29 2015 03:14:27 GMT+02:00 report_id=ffa9474d-
6d72-44f7-a99c-c0d230fec1f3 report_url=https://retroscan.tre
ndmicro.com/retroscan/scanDetails.html?reportID\=1e84c77b-04
52-4f00-b5b8-e41c0ea9ef1a&reportType\=standard compromised_c
lient_num=1 cnc_host_num=1 callback_attempt_num=20 firstCall
backTime=Mar 29 2015 03:04:27 GMT+02:00 lastCallbackTime=Mar
29 2015 03:09:27 GMT+02:00
TMEF Retro Scan Detection Logs
Table 5-10. TMEF Retro Scan Detection Logs
TMEF Key Description Value
Header (logVer) TMEF format version CEF: 0
Header (vendor) Appliance vendor Trend Micro
Header (pname) Appliance product Deep Discovery Inspector
Header (pver) Appliance version Example: 3.8.1181
Header (eventid) Signature ID 100134
Header (eventName) Event Name RETROSCAN_DETECTION
5-31
Trend Micro Deep Discovery Inspector Syslog Guide
TMEF Key Description Value
Header (severity) Severity 8
callback_address Callback address Example: http://1.2.3.4/
callback_time Callback time Example: Mar 09 2015 17:05:21 GMT
+08:00
category Category Example: Reference
cnc_host C&C host address Example: 10.1.144.199
compromised_client Compromised client Example: 10.1.144.199
address
deviceGUID Appliance GUID Example: 6B593E17AFB7-40FBBB28-
A4CE-0462-A536
protocol Protocol Example: HTTP
rating Rating Example: Suspicious
related_attacker_group Related attacker group Example: Elise|Taidoor
related_malware Related malware Example: fosniw|ge|palevo
report_id Report ID Example: 74c15fe0-90c9-446b-
abc4-379d6d7213e7
scan_category Scan category Example: C&C Server
scan_rating Scan rating Example: Dangerous
scan_ts Scan time Example: Mar 09 2015 17:05:21 GMT
+08:00
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1200|100134|R
ETROSCAN_DETECTION|8|guid=906A61690458-4099A441-898C-BDD2-C7
C1 report_id=0938508b-ec47-47a1-80ea-cd8e3b747822 scan_ts=Ma
r 29 2015 03:14:31 GMT+02:00 callback_time=Mar 29 2015 03:04
:31 GMT+02:00 callback_address=http://app2.winsoft98.com/app
.asp?prj\=4&pid\=haha1&logdata\=MacTryCnt:0&code\=&ver\=1.0.
0.45&appcheck\=1 compromised_client=59.125.99.235 cnc_host=
5-32
Syslog Content Mapping - TMEF
app2.winsoft98.com protocol=HTTP rating=Suspicious category
=Reference scan_rating=Dangerous scan_category=C&C Server r
elated_malware=fosniw|ge|mactrycnt|palevo related_attacker_
group=Elise|Taidoor
5-33
TREND MICRO INCORPORATED
225 E. John Carpenter Freeway, Suite 1500
Irving, Texas 75062 U.S.A.
Phone: +1 (817) 569-8900, Toll-free: (888) 762-8736
Email: support@trendmicro.com
www.trendmicro.com
Item Code: APEM59039/200721