On the Completed tab, click anywhere on a row to view detailed information about the submitted sample. A new section below the row shows the details.
The following fields are displayed on this screen:
Field Name |
Information |
|
---|---|---|
File/Email Message Sample |
URL Sample |
|
Submission details |
Basic data fields (such as Logged, File name, and Type) extracted from the raw logs |
Basic data fields (such as Logged, URL, Source IP and port, and Destination IP and port) extracted from the raw logs Note:
Deep Discovery Analyzer may have normalized the URL. |
|
||
Notable characteristics |
The categories of notable characteristics that the sample exhibits, which can be any or all of the following:
|
|
Other submission logs |
A table that shows the following information about other log submissions:
|
|
MITRE ATT&CK ™ Framework |
A list of MITRE ATT&CK ™ tactics, techniques, and sub-techniques detected. Click a link to view more information on the MITRE website. |
|
Report |
The PDF icon () links to a downloadable PDF report and the HTML icon () links to an interactive HTML report. Note:
An unclickable link means there were errors during simulation. Mouseover the link to view details about the error. |
|
Investigation package |
Download links to a password-protected investigation package that you can download to perform additional investigations. For details, see Investigation Package. |
|
Global intelligence |
View in Threat Connect is a link that opens Trend Micro Threat Connect The page contains detailed information about the sample. |