LEEF Threat Logs
LEEF Key
|
Description
|
Value
|
Header (logVer)
|
LEEF format version
|
LEEF: 1.0
|
Header (vendor)
|
Appliance vendor
|
Trend Micro
|
Header (pname)
|
Appliance product
|
Deep Discovery Director
|
Header (pver)
|
Appliance version
|
Example: 5.3.0.1212
|
Header (eventName)
|
Event Name
|
|
origin
|
Deep Discovery appliance the log originated
from
|
Inspector
|
act
|
The action in the event
|
|
aggregatedCnt
|
Aggregated count
|
Example: 1
|
aptRelated
|
Indicates an APT-related event
|
0 or 1
|
botCommand
|
BOT command
|
Example: COMMIT
|
botUrl
|
BOT URL
|
Example: trend.com
|
cccaDestination
|
CCCA address
|
Example: 10.1.144.199
|
cccaDestinationFormat
|
CCCA type
|
|
cccaDetection
|
CCCA detection
|
0 or 1
|
cccaDetectionSource
|
CCCA log is detected by
|
|
cccaRiskLevel
|
CCCA Risk Level
|
|
channelName
|
Channel name
|
Example: IRCChannel1
|
chatUserName
|
Nickname
|
Example: IRCUser1
|
cnt
|
Total count
|
Example: 1
|
compressedFileName
|
File name in archive
|
Example: mtxlegih.dll
|
detectionType
|
Detection type
|
|
deviceDirection
|
Packet direction
|
|
deviceGUID
|
Appliance GUID
|
Example: 6B593E17AFB7-40FBBB28-A4CE-0462-A536
|
deviceMacAddress
|
Appliance MAC address
|
Example: 00:0C:29:6E:CB:F9
|
deviceRiskConfidenceLevel
|
Confidence level
|
|
devTime
|
Log generation time
|
Example: Mar 09 2015 17:05:21 GMT+08:00
|
devTimeFormat
|
Time format
|
MMM dd yyyy HH:mm:ss z
|
dhost
|
Destination host name
|
Example: dhost1
|
dOSName
|
Destination host OS
|
Example: Android
|
dst
|
Destination IP address
|
Example: 10.1.144.199
|
dstGroup
|
Network Group assigned to a destination host
|
Example: monitor1
|
dstMAC
|
Destination MAC
|
Example: 00:0C:29:6E:CB:F9
|
dstPort
|
Destination port
|
Value between 1 and 65535
|
dstZone
|
Destination zone
|
|
duser
|
Mail recipient
|
Example: duser1
|
dUser1
|
Destination user name 1
|
Example: admin
|
dUser1LoginTime
|
Destination user log on time 1
|
Example: Mar 09 2015 17:05:21 GMT+08:00
|
dUser2
|
Destination user name 2
|
Example: admin
|
dUser2LoginTime
|
Destination user log on time 2
|
Example: Mar 09 2015 17:05:21 GMT+08:00
|
dUser3
|
Destination user name 3
|
Example: admin
|
dUser3LoginTime
|
Destination user log on time 3
|
Example: Mar 09 2015 17:05:21 GMT+08:00
|
dvc
|
Appliance IP address
|
Example: 10.1.96.147
|
dvchost
|
Appliance host name
|
Example: localhost
|
evtCat
|
Event category
|
Example: Suspicious Traffic
|
evtSubCat
|
Event subcategory
|
Example: Email
|
fileHash
|
SHA1
|
Example:1EDD5B38DE4729545767088C5CAB395E4197C8F3
|
filePath
|
File path
|
Example: SHARE\\
|
fileType
|
Real file type
|
Example: 1638400
|
fname
|
File name
|
Example: excel.rar
|
fsize
|
File size
|
Example: 131372
|
hackerGroup
|
Hacker group
|
Example: Comment Crew
|
hackingCampaign
|
Hacking campaign
|
Example:Aurora
|
hostName
|
Host name
|
Example: CLIENT1
|
interestedIp
|
Interested IP
|
Example: 10.1.144.199
|
mailMsgSubject
|
Mail subject
|
Example: hello
|
malFamily
|
Malware family
|
Example:Duqu
|
malName
|
Malware name
|
Example: HEUR_NAMETRICK.A
|
malType
|
Malware type
|
Example: MALWARE
|
mitigationTaskId
|
Event task ID for mitigation
|
Example: dc036acb-9a2e-4939-8244-dedbda9ec4ba
|
msg
|
Description
|
Example: HEUR_NAMETRICK.A - SMTP (Email)
|
oldFileHash
|
Mail attachment SHA1
|
Example:
1EDD5B38DE4729545767088C5CAB395E4197C8F3
|
oldFileName
|
Mail attachment file name
|
Example: excel.rar
|
oldFileSize
|
Mail attachment file size
|
Example: 150000
|
oldFileType
|
Mail attachment file type
|
Example: 1638400
|
pAttackPhase
|
Primary attack phase
|
|
pComp
|
Detection engine/component
|
Example: VSAPI
|
peerIP
|
Peer IP
|
Example: 10.1.144.199
|
proto
|
Protocol
|
Example: SMTP
|
protoGroup
|
Protocol group
|
Example: SMTP
|
ptype
|
Application type
|
IDS
|
requestClientApplication
|
User agent
|
Example: IE
|
riskType
|
Potential risk
|
|
ruleId
|
Rule ID
|
Example: 52
|
sAttackPhase
|
Secondary attack phase
|
Example: Point of Entry
|
sev
|
Severity
|
|
shost
|
Source host name
|
Example: shost1
|
sOSName
|
Source host OS
|
Example: Android
|
src
|
Source IP address
|
Example: 10.1.144.199
|
srcGroup
|
Network Group assigned to a source host
|
Example: monitor1
|
srcMAC
|
Source MAC
|
Example: 00:0C:29:6E:CB:F9
|
srcPort
|
Source port
|
Value between 1 and 65535
|
srcZone
|
Source zone
|
|
suid
|
User name
|
Example: User1
|
suser
|
Mail sender
|
Example: suser1
|
sUser1
|
Source user name 1
|
Example: admin
|
sUser1LoginTime
|
Source user log on time 1
|
Example: Mar 09 2015 17:05:21 GMT+08:00
|
sUser2
|
Source user name 2
|
Example: admin
|
sUser2LoginTime
|
Source user log on time 2
|
Example: Mar 09 2015 17:05:21 GMT+08:00
|
sUser3
|
Source user name 3
|
Example: admin
|
sUser3LoginTime
|
Source user log on time 3
|
Example: Mar 09 2015 17:05:21 GMT+08:00
|
threatType
|
Threat type
|
|
url
|
URL
|
Example: http://1.2.3.4/query?term=value
|
vLANId
|
VLANID
|
Value between 0 and 4095
|
Log sample:
NoteWhen using the LEEF log syntax, separate event attributes
with <009> as a tab delimiter.
|
May 15 16:00:47 localhost LEEF:1.0|Trend Micro|Deep Discovery Director|5.3.0.1212|SECURITY_RISK_DETECTION|origin=Inspector<0 09>devTimeFormat=MMM dd yyyy HH:mm:ss z<009>ptype=IDS<009>dvc= 10.1.105.120<009>deviceMacAddress=00:50:56:B6:FE:C0<009>dvchos t=twddiv-120<009>deviceGUID=92A12204F15F-48B59215-C17B-C516-B2 CB<009>devTime=Apr 01 2019 10:24:45 GMT+00:00<009>sev=8<009>pr otoGroup=TCP<009>proto=TCP<009>vLANId=4095<009>deviceDirection =1<009>dhost=2.2.2.2<009>dst=2.2.2.2<009>dstPort=443<009>dstMA C=58:35:d9:de:4a:42<009>shost=10.1.117.172<009>src=10.1.117.17 2<009>srcPort=35702<009>srcMAC=00:08:e3:ff:fd:90<009>malName=U SR_SUSPICIOUS_IP.UMXX<009>malType=MALWARE<009>fileType=-65536< 009>fsize=0<009>ruleId=729<009>msg=Callback to IP address in C ontrol Manager and Deep Discovery Director User-Defined Suspic ious Objects list<009>deviceRiskConfidenceLevel=1<009>pComp=CA V<009>riskType=1<009>srcGroup=My Company/TW 12F<009>srcZone=1< 009>dstZone=0<009>detectionType=1<009>act=not blocked<009>thre atType=1<009>interestedIp=10.1.117.172<009>peerIp=2.2.2.2<009> cnt=5<009>aggregatedCnt=1<009>cccaDestinationFormat=IP_DOMAIN< 009>cccaDetectionSource=USER_DEFINED<009>cccaRiskLevel=3<009>c ccaDestination=2.2.2.2<009>cccaDetection=1<009>evtCat=Callback <009>evtSubCat=Bot<009>aptRelated=0<009>pAttackPhase=Command a nd Control Communication