CEF Key
|
Description
|
Value
|
Header (logVer)
|
CEF format version
|
CEF:0
|
Header (vendor)
|
Product vendor
|
Trend Micro
|
Header (pname)
|
Product name
|
Apex Central
|
Header (pver)
|
Product version
|
2019
|
Header (eventid)
|
PML:Action result
|
PML:File cleaned
|
Header (eventName)
|
Detection name
|
virusa
|
Header (severity)
|
Severity
|
3
|
rt
|
Event trigger time in UTC
|
Example:
Mar 22 2018 08:23:23 GMT+00:00 |
dvchost
|
Product server
|
Example:
Sample_Host |
cn1Label
|
Corresponding label for the
cn1field |
ThreatType |
cn1
|
Probable threat type
|
Example:
35143 For more information, see Threat Type Mapping Table.
|
cs2Label
|
Corresponding label for the
cs2field |
DetectionName |
cs2
|
Security threat
|
Example:
Troj.Win32.TRX.XXPE002FF017 |
shost
|
Infected endpoint
|
Example:
10.0.0.1 |
suser
|
Logon user
|
Example:
TREND\\User |
cn2Label
|
Corresponding label for the
cn2field |
DetectionType |
cn2
|
Detection type
|
Example:
0
|
filePath
|
File path
|
Example: "D:\\"
|
fname
|
File name
|
Example: "ALCORMP.EXE"
|
deviceCustomDate1
|
File creation time
|
Example:
2017-04-26 05:53:27.000 |
sproc
|
System process
|
Example:
notepad.exe |
cn4Label
|
Corresponding label for the
cn4field |
ProcessCommandLine |
cs4
|
Process command
|
Example:
notepad.exe |
duser
|
Process owner
|
Example:
user1 |
app
|
Infection channel
|
Example:
10
|
cs3Label
|
Corresponding label for the
cs3field |
InfectionLocation |
cs3
|
Infection source
|
Example:
http://10.0.0.1/ |
dst
|
Product/Endpoint IPv4 Address
|
Example:
10.0.17.6 |
c6a3Label
|
Corresponding label for the
c6a3field |
Product/Endpoint IP |
c6a3
|
Product/Endpoint IPv6 Address
|
Example:
fd66:5168:9882:6:b5b0:b2b5:4173:3f5d |
cn3Label
|
Corresponding label for the
cn3field |
Confidence |
cn3
|
Threat probability
|
Example:
82 |
act
|
Action result
|
Example:
21 For more information, see Action Mapping Table.
|
filehash
|
File SHA-1
|
Example:
52c17c785b45ee961f68fb17744276076f383085 |
dhost
|
Product entity/endpoint
|
Example:
dhost1 |
deviceExternalId
|
Log sequence number
|
Example:
100 |
deviceFacility
|
Product
|
Example:
Apex One |
reason
|
Critical threat type
|
Example:
E
|
deviceNtDomain
|
Active Directory domain
|
Example: APEXTMCM
|
dntdom
|
Apex One domain hierarchy
|
Example: OSCEDomain1
|
TMCMLogDetectedHost
|
Endpoint name where the log event occurred
|
Example: MachineHostName
|
TMCMLogDetectedIP
|
IP address where the log event occurred
|
Example: 10.1.2.3
|
ApexCentralHost
|
Apex Central host name
|
Example: TW-CHRIS-W2019
|
devicePayloadId
|
Unique message GUID
|
Example: 1C00290C0360-9CDE11EB-D4B8-F51F-C697
|
TMCMdevicePlatform
|
Endpoint operating system
|
Example: Windows 7 6.1 (Build 7601) Service Pack 1
|
Log sample:
CEF:0|Trend Micro|Apex Central|2019|PML:File cleaned|Detecti on01|3|deviceExternalId=1 rt=Dec 01 2018 16:01:00 GMT+00:00 deviceFacility=15 dvchost=OSCE01 cn1Label=ThreatType cn1=1 c s2Label=DetectionName cs2=Detection01 shost=10.0.0.1 suser=S ample_Domain\\Sample_User cn2Label=DetectionType cn2=0 fileP ath=C:\\test01\\aaa.exe fname=aaa.exe deviceCustomDate1Label =FileCreationDate deviceCustomDate1=Dec 02 2018 00:01:00 GMT +00:00 sproc=notepad.exe cs4Label=ProcessCommandLine cs4=not epad.exe -test duser=admin01 app=1 cs3Label=InfectionLocatio n cs3=https://10.1.1.1 dst=80.1.1.1 cn3Label=Confidence cn3= 81 act=21 fileHash=177750B65A21A9043105FD0820B85B58CF148A01 dhost=OSCEClient11 reason=E deviceNtDomain=APEXTMCM dntdom=O SCEDomain1 TMCMLogDetectedHost=OSCEClient11 TMCMLogDetectedI P=80.1.1.1 ApexCentralHost=TW-CHRIS-W2019 devicePayloadId=1C 00290C0360-9CDE11EB-D4B8-F51F-C697 TMCMdevicePlatform=Windo ws 7 6.1 (Build 7601) Service Pack 1