CEF Violation Logs
CEF Key
|
Description
|
Value
|
Header(logVer)
|
CEF format version
|
CEF: 0
|
Header(vendor)
|
Appliance vendor
|
Trend Micro |
Header(pname)
|
Appliance product
|
Deep Discovery Web Inspector |
Header(pver)
|
Appliance version
|
Example: 2.5.0.1105
|
Header(eventid)
|
Signature ID
|
Example: 100001
|
Header(eventName)
|
Description
|
Example: Ransomware
|
Header(severity)
|
Risk level
|
|
rt
|
UTC timestamp
|
Example: Oct 20 2017 17:15:57 GMT+00:00
|
logType
|
Log type
|
6: Violation Log
|
companyId
|
Company ID
|
Reserved, value is default
|
adDomain
|
AD domain
|
Active Directory domain information
Example: trendnet.org
|
userName
|
Client IP
|
Example: 10.204.171.200
|
groupName
|
Group name
|
Active Directory group name information
|
department
|
Department
|
Active Directory department information
Example: commercial
|
device
|
Device
|
Reserved, default null
|
act
|
Action
|
Can be one of the following
values:
|
app
|
Protocol channel
|
|
tlsVersion
|
TLS version
|
|
size
|
Transport bytes by Deep Discovery Web Inspector, unit bytes
|
Example: 15
|
dst
|
Destination IP address of request
|
Example: 54.148.125.151
|
src
|
Source IP address of request
|
Example: 10.204.171.200
|
upstreamSize
|
The upstream payload from Deep Discovery Web Inspector to
server, unit bytes
|
Example: 54
|
downstreamSize
|
The downstream payload from server to Deep Discovery Web
Inspector, unit bytes
|
Example: 49
|
domain
|
Domain
|
Example: ca95-1.winshipway.com
|
detectionType
|
Detection type
|
For a description of each type, see List of Detection Types
|
detectionSubType
|
Detection sub-type
|
Reserved, default 0
|
threatType
|
Threat type
|
|
severity
|
Risk level
|
|
policyName
|
Policy name
|
Example: test
|
profileName
|
Profile name
|
Reserved, currently displays as default
|
wrsThreshold
|
WRS threshold
|
Value is set to 50
|
principalName
|
Principal name
|
Reserved, default is null
|
request
|
URL
|
Example: hxxp://ca95-1.winshipway.com/
|
cat
|
URL category
|
Example: Ransomware
|
appName
|
Application name
|
Reserved, default is null
|
wrsScore
|
WRS score
|
Example: 81
|
malwareType
|
Malware type
|
Reserved, default 0
|
malwareName
|
Malware name
|
Example: Ransomware
|
soData
|
Suspicious object displayed on the Deep Discovery Web
Inspector
Detections page
|
Can be one of the following types:
|
fname
|
File name
|
Example: a.txt
|
filehash
|
SHA1
|
Example: 0d3d4cdfff683b0c17843a889e867fe29095c3ac
|
msg
|
Log description
|
Value is null
|
httpTrans
|
HTTP transaction
|
Example:
{"http_req":{"headers":{"accept-encoding":"gzip,deflate","host":"10.204.170.7","user-agent":"Mozilla/5.0
(Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/59.0.3071.115
Safari/537.36"},"host":"10.204.170.7","method":"GET","path":"TESTDATA/virus/NonCleanable/EXT_BOO.BOO","scheme":"http"},
"http_response":{"headers":{"content-length":"512","content-type":"text/plain"},"status_code":200},"ver":"1.0"}
|
debugInfo
|
Debug information
|
Example:
{"conn_state":{"auth_id_type":"ip","auth_is_guest":false,"auth_reuse":false,"auth_user_id":"10.204.171.200","bypass_scan":false,"c_listen_addr":"0.0.0.0:8080","c_local_addr":"10.204.133.74:8080","c_peer_addr":"10.204.171.200:64353","c_recv_bytes":470,"c_sent_bytes":0,"gateway_ip":"10.204.171.200","s_recv_bytes":0,"s_sent_bytes":0,"tmufe_timeout":false},"errcode":"3055,IWSSHttpProxyProtocol.cpp:2569","src":"Proxy","trans":{"info":"","time":"1:
1508519757821, 2: 0, 13: 1, 14: 1, 33: 1, 15: 1, 16: 1, 34: 1, 38: 1"},
"ver":"1.0"}
|
Log sample:
CEF:0|Trend Micro|Deep Discovery Web Inspector|2.5.0.1105| 100001|Ransomware|3|wrsScore=49 userName=10.204.171.200 domain=ca95-1.winshipway.com adDomain= policyName=default detectionType=21 app=1 principalName= logType=6 groupName= malwareType=0 httpTrans={"http_req":{"headers":{"accept- encoding":"gzip, deflate","host":"ca95-1.winshipway.com", "proxy-connection":"keep-alive","user-agent":"Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36"},"host": "ca95-1.winshipway.com","method":"GET","path":"/","scheme": "http"},"http_response":{"headers":null,"status_code":-1}, "ver":"1.0"} device= profileName=default tlsVersion=0 soData= size=0 rt=Oct 20 2017 17:15:57 GMT+00:00 src=10.204.171.200 threatType=1 wrsThreshold=50 severity=3 malwareName=Ransomware from WRS companyId= filehash= dst=54.148.125.151 appName= request=http://ca95-1.winshipway.com/ techSubType=0 cat=Ransomware upstreamSize=0 downstreamSize=0 fname= act=block department= debugInfo={"conn_state": {"auth_id_type":"ip","auth_is_guest":false,"auth_reuse": false,"auth_user_id":"10.204.171.200","bypass_scan":false, "c_listen_addr":"0.0.0.0:8080","c_local_addr":"10.204.133.74 :8080","c_peer_addr":"10.204.171.200:64353","c_recv_bytes" :470,"c_sent_bytes":0,"gateway_ip":"10.204.171.200", "s_recv_bytes":0,"s_sent_bytes":0,"tmufe_timeout":false}, "errcode":"3055,IWSSHttpProxyProtocol.cpp:2569","src": "Proxy","trans":{"info":"","time":"1:1508519757821, 2: 0, 13: 1, 14: 1, 33: 1, 15: 1, 16: 1, 34: 1, 38: 1"},"ver":"1.0"} msg=