TMEF ICAP Pre-scan Detection Logs
TMEF Key
|
Description
|
Value
|
Header (logVer)
|
TMEF format version
|
CEF: 0
|
Header (vendor)
|
Appliance vendor
|
Trend Micro
|
Header (pname)
|
Appliance product
|
Deep Discovery Analyzer
|
Header (pver)
|
Appliance version
|
Example: 7.1.0.1088
|
Header (eventName)
|
Event name
|
ICAP_PRESCAN_EVENT
|
Header (severity)
|
Risk level
|
8
|
deviceGUID
|
Appliance GUID
|
Example: 6B593E17AFB7-40FBBB28-A4CE-0462-A536
|
deviceMacAddress
|
Appliance MAC address
|
Example: 00:0C:29:6E:CB:F9
|
rt
|
Log generation time
|
Example: May 31 2021 15:56:04 GMT+08:00
|
dvcmac
|
Appliance MAC address
|
Example: 00:0C:29:56:B3:57
|
dvc
|
Appliance IP address
|
Example: 10.1.144.199
|
dvchost
|
Appliance host name
|
Example: localhost
|
fileHash
|
SHA1
|
Example: 1EDD5B38DE4729545767088C5CAB395E4197C8F3
|
fileType
|
True file type
|
Example: RIFF bitmap file
|
fname
|
File name
|
Example: excel.rar
|
sha256
|
SHA256
|
Example:
275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F
|
cn1Label
|
Sample type
|
sampleType
|
cn1
|
Sample type
|
|
request
|
URL
|
Example: http://example.com:80/
|
malName
|
Malware name
|
Example: HEUR_NAMETRICK.A
|
src
|
Source IPv4 address
|
Example: 10.1.144.199
|
dst
|
Destination IPv4 address
|
Example: 10.1.144.198
|
cs1Label
|
submitterName
|
malName
|
cs1
|
ICAP client
|
Example: 10.205.190.3
|
cs2Label
|
icapMode
|
|
cs2
|
ICAP mode
|
|
deviceExternalId
|
Appliance GUID
|
Example: 6B593E17AFB7-40FBBB28-A4CE-0462-A536
|
cs2Label
|
submitterName
|
Example:
|
cs3Label
|
sourceUser
|
|
cs3
|
X-Authenticated-User ICAP header sent by the ICAP client
|
Example:
|
cs4Label
|
identifiedBy
|
|
cs4
|
The name of the detection module that processed the object
|
Example:
|
cs5Label
|
sha256
|
|
cs5
|
SHA256
|
Example:
275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F
|
Log sample:
CEF:0|Trend Micro|Deep Discovery Analyzer|7.1.0.1088|20012 9|ICAP_PRESCAN_EVENT|8|rt=Aug 01 2021 02:36:08 GMT+00:00 d vc=10.204.191.52 dvchost=DDAN deviceMacAddress=00:50:56:98 :33:69 deviceGUID=627EE441-DD62-4483-B9E4-60B3C8A92529 src =10.2.11.122 cn1Label=sampleType cn1=1 fileHash=317D137FE5 90EE561648ECA137CB2B6898526115 request=http://wrs21.test.c om:80/ malName=TSPY_KEYLOG.GC cs1Label=submitterName cs1=1 0.204.190.6 cs2Label=icapMode cs2=REQMOD cs3Label=sourceUs er cs4Label=identifiedBy cs4=Web Reputation Services cs5La bel=sha256 cs5=F5C748A953D23B8CE4F5C792FDC1E7987471DD48FE2 4ABA07C3CFD10B4AEF72F
CEF:0|Trend Micro|Deep Discovery Analyzer|7.1.0.1088|20012 9|ICAP_PRESCAN_EVENT|8|rt=Aug 01 2021 02:36:11 GMT+00:00 d vc=10.204.191.52 dvchost=DDAN deviceMacAddress=00:50:56:98 :33:69 deviceGUID=627EE441-DD62-4483-B9E4-60B3C8A92529 dst =10.2.1.123 src=10.2.1.122 cn1Label=sampleType cn1=0 fname =3-layer.zip fileType=ZIP archive fileHash=D7273555CB0AC08 303415CBEB3F3D72DD0893BC4 request=http://test.com/3-layer. zip malName=Eicar_test_file,TROJ_OLEXP.TPD cs1Label=submit terName cs1=10.204.190.6 cs2Label=icapMode cs2=RESPMODE cs 3Label=sourceUser cs4Label=identifiedBy cs4=Advanced Threa t Scan Engine cs5Label=sha256 cs5=08F18BC62297A67DD91E192A 27C1EEDE3C1BBEE19A90FC0B1FADD07CE93B9823