LEEF File Analysis Events
LEEF Key
|
Description
|
Value
|
Header (logVer)
|
LEEF format version
|
LEEF: 1.0
|
Header (vendor)
|
Appliance vendor
|
Trend Micro
|
Header (pname)
|
Appliance product
|
Deep Discovery Inspector
|
Header (pver)
|
Appliance version
|
Example: 3.8.1181
|
Header (eventName)
|
Event Name
|
FILE_ANALYZED
|
deviceGUID
|
Appliance GUID
|
Example: 6B593E17AFB7-40FBBB28-A4CE-0462-A536
|
deviceMacAddress
|
Appliance MAC address
|
Example: 00:0C:29:6E:CB:F9
|
deviceOSName
|
Sandbox image type
|
SandboxImageType
|
deviceProcessHash
|
Parent SHA1
|
Example: 1EDD5B38DE4729545767088C5CAB395E4197C8F3
|
devTime
|
Analysis time
|
Example: Mar 09 2015 17:05:21 GMT+08:00
|
devTimeFormat
|
Time format
|
MMM dd yyyy HH:mm:ss z
|
dvc
|
Appliance IP address
|
Example: 10.1.144.199
|
dvchost
|
Appliance host name
|
Example: localhost
|
fileHash
|
File SHA1
|
Example: 1EDD5B38DE4729545767088C5CAB395E4197C8F3
|
fileType
|
True file type
|
Example: WIN32 EXE
|
fname
|
File name
|
Example: excel.rar
|
fsize
|
File size
|
Example: 131372
|
gridIsKnownGood
|
GRID is known good
|
|
malName
|
Virus name
|
Example: HEUR_NAMETRICK.A
|
pcapReady
|
PCAP ready
|
Example: 1
|
pComp
|
Detection source
|
|
rozRating
|
ROZ rating
|
|
sev
|
Severity
|
3 (fixed value)
|
Log sample:
NoteWhen using the LEEF log syntax, separate event attributes
with <009> as a tab delimiter.
|
LEEF:1.0|Trend Micro|Deep Discovery Inspector|3.8.1181|FILE_ ANALYZED|devTime=Mar 11 2015 07:36:27 GMT-04:00<009>devTimeF ormat=MMM dd yyyy HH:mm:ss z<009>sev=3<009>pComp=Sandbox<009 >dvc=10.201.156.143<009>dvchost=ddi38-143<009>deviceMacAddre ss=00:0C:29:A6:53:0C<009>deviceGUID=D2C1D6D20FF8-4FC98F92-25 EB-D7DA-AF0E<009>fname=mwsoemon.exe<009>fileHash=89DE67C5220 91EE259533D9CBDDF37DDB8C8D636<009>malName=Possible_Virus<009 >fileType=WIN32 EXE<009>fsize=59392<009>deviceOSName=MAK_win 7sp1en_offices_noab_TL<009>gridIsKnownGood=-1<009>rozRating= 1<009>pcapReady=1