|
CEF Key |
Description |
Value |
|---|---|---|
|
Header (logVer) |
CEF format version |
CEF:0 |
|
Header (vendor) |
Appliance vendor |
Trend Micro |
|
Header (pname) |
Appliance product |
Apex Central |
|
Header (pver) |
Appliance version |
2019 |
|
Header (eventid) |
NCIE:Action |
NCIE:Pass |
|
Header (eventName) |
Name |
Suspicious Connection |
|
Header (severity) |
Severity |
3 |
|
deviceExternalId |
ID |
Example: "1" |
|
cat |
Log type |
Example: "1756" |
|
deviceFacility |
Product |
Example: "Apex One" |
|
rt |
Event trigger time in UTC |
Example: "Mar 22 2018 08:23:23 GMT+00:00" |
|
deviceProcessName |
Process |
Example: "C:\\Windows\\system32\\svchost-1.exe" |
|
src |
Local IPv4 address |
Example: "10.201.86.152" |
|
c6a2Label |
Corresponding label for the "c6a2" field |
Example: "SLF_SourceIP" |
|
c6a2 |
Local IPv6 address |
Example: "2620:101:4003:7a0:fd4b:52ed:53bd:ae3d" |
|
spt |
Local IP address port |
Example: "54594" |
|
dst |
Remote IPv4 address |
Example: "10.69.81.64" |
|
c6a3Label |
Corresponding label for the "c6a3" field |
Example: "SLF_DestinationIP" |
|
c6a3 |
Remote IPv6 address |
Example: "fe80::38ca:cd15:443c:40bb%11" |
|
dpt |
Remote IP address port |
Example: "80" |
|
act |
Action |
Example: "Pass"
|
|
deviceDirection |
Traffic direction |
Example: "Inbound"
|
|
cn1Label |
Corresponding label for the "cn1" field |
Example: "SLF_PatternType" |
|
cn1 |
Pattern type |
Example: "2"
|
|
cs2Label |
Corresponding label for the "cs2" field |
Example: "NCIE_ThreatName" |
|
cs2 |
Threat name |
Example: "Malicious_identified_CnC_querying_on_UDP_detected" |
|
reason |
Critical threat type |
Example: "E"
|
|
dvchost |
Host name |
Example: "localhost" |
|
deviceNtDomain |
Active Directory domain |
Example: APEXTMCM |
|
dntdom |
Apex One domain hierarchy |
Example: OSCEDomain1 |
|
TMCMLogDetectedHost |
Endpoint name where the log event occurred |
Example: MachineHostName |
|
TMCMLogDetectedIP |
IP address where the log event occurred |
Example: 10.1.2.3 |
|
ApexCentralHost |
Apex Central host name |
Example: TW-CHRIS-W2019 |
|
devicePayloadId |
Unique message GUID |
Example: 1C00290C0360-9CDE11EB-D4B8-F51F-C697 |
|
TMCMdevicePlatform |
Endpoint operating system |
Example: Windows 7 6.1 (Build 7601) Service Pack 1 |
Log sample:
CEF:0|Trend Micro|Apex Central|2019|NCIE:Pass|Suspicious Connection|3|deviceExternalId=1 rt=Oct 11 2017 06:34:06 GMT+0 0:00 cat=1756 deviceFacility=Apex One deviceProcessName=C:\\W indows\\system32\\svchost-1.exe act=Pass src=10.201.86.152 ds t=10.69.81.64 spt=54594 dpt=80 deviceDirection=None cn1Label= SLF_PatternType cn1=2 cs2Label=NCIE_ThreatName cs2=Malicious_ identified_CnC_querying_on_UDP_detected reason=F deviceNtDoma in=APEXTMCM dntdom=OSCEDomain1 dvchost=shost1 TMCMLogDetected Host=shost1 TMCMLogDetectedIP=10.1.2.3ApexCentralHost=TW-CHRI S-W2019 devicePayloadId=1C00290C0360-9CDE11EB-D4B8-F51F-C697 TMCMdevicePlatform=Windows 7 6.1 (Build 7601) Service Pack 1
