Field Name |
General Field |
Description |
Sample |
Products |
---|---|---|---|---|
uuid |
- |
Unique key of the log |
|
|
filterRiskLevel |
- |
Event's top level filter risk |
|
|
hostName |
DomainName |
Computer name of the client host (For Deep Discover Inspector, the hostname from the suspicious URL) |
|
|
interestedHost |
DomainName |
Endpoint hostname (For example, if an intranet host accesses a suspicious internet host, intranet host will be "peerHost" and internet host will be "interestedHost") |
|
|
shost |
DomainName |
Source hostname |
|
|
dhost |
DomainName |
Destination hostname |
|
|
denyListHost |
DomainName |
Domain of the Virtual Analyzer Suspicious Object |
|
|
endpointHostName |
EndpointName |
Endpoint hostname |
|
|
userDomain |
EndpointName |
Domain of the username (For Apex One SaaS, last signed in user; For Trend Micro Web Security, last signed in user to Trend Micro Web Security proxy; For Internet Access Gateway, last signed in user Internet Access Gateway proxy) |
|
|
endpointGUID |
EndpointID |
GUID of the agent which reported this detection |
|
|
request |
URL |
Notable URL |
|
|
botUrl |
URL |
Bot URL |
|
|
cccaDestination |
URL |
Destination domain, IP, URL, or recipient |
|
|
src |
|
Source IP |
|
|
dst |
|
Destination IP |
|
|
interestedIp |
|
IP of interestedHost |
|
|
endpointIp |
|
IP of endpointHost (For ptp/stp, client IP) |
|
|
peerIp |
|
IP of peerHost |
|
|
denyListIp |
|
IP of the Virtual Analyzer Suspicious Object |
|
|
dpt |
Port |
Destination port |
|
|
spt |
Port |
Source port |
|
|
policyUuid |
- |
Unique key of the cloud access or risk control rule, or the hardcode unique key of the global blocked/approved list |
|
Zero Trust Secure Access - Internet Access |
ruleUuid |
- |
ID of the risk assessment and control action defined in risk control rules |
|
Zero Trust Secure Access - Internet Access |
fileName |
FileName |
File name |
|
|
objectFileName |
FileName |
Object file name |
|
|
compressedFileName |
FileName |
File name of the compressed file |
|
|
attachmentFileName |
FileName |
File name of an attachment |
|
|
filePath |
FileFullPath |
File path without the file name |
|
|
filePathName |
FileFullPath |
File path with the file name |
|
|
objectFilePath |
FileFullPath |
File path of the target object |
|
|
quarantineFilePath |
- |
OfficeScan server file path for the quarantined file (When a file is quarantined, it is encrypted and copied to the OfficeScan server for post-mortem analysis) |
- |
- |
forensicFilePath |
- |
File path of the forensic file (When a Data Loss Prevention policy is triggered, the file is encrypted and copied to the OfficeScan server for post-mortem analysis) |
|
|
fileHash |
FileSHA1 |
SHA-1 of file that triggered the rule or policy |
|
|
attachmentFileHash |
FileSHA1 |
SHA-1 of the email attachment |
|
|
attachmentFileHashSha1 |
FileSHA1 |
SHA-1 of the attached file (attachementFileName) |
|
|
compressedFileHash |
FileSHA1 |
SHA-1 of the decompressed archive |
|
|
denyListFileHash |
FileSHA1 |
SHA-1 of the Virtual Analyzer Suspicious Object |
|
|
objectFileHashSha1 |
FileSHA1 |
SHA-1 of the objectFilePath object |
|
|
oldFileHash |
FileSHA1 |
SHA-1 of the target process image or target file (wasEntity from an IM event) |
|
|
fileHashSha256 |
FileSHA2 |
SHA-256 of the file (fileName) |
|
|
attachmentFileHashSha256 |
FileSHA2 |
SHA-256 of the attached file (attachementFileName) |
|
|
compressedFileHashSha256 |
FileSHA2 |
SHA-256 of compressed suspicious file |
|
|
objectFileHashSha256 |
FileSHA2 |
SHA-256 of the object (objectFilePath) |
|
|
attachmentFileHashMd5 |
FileMD5 |
MD5 of the attached file (attachementFileName) |
|
|
objectFileHashMd5 |
FileMD5 |
MD5 of the object |
|
|
processCmd |
CLICommand |
Subject process command line |
|
|
objectCmd |
CLICommand |
Object process command line |
|
|
objectRegistryData |
RegistryValueData |
Registry data contents |
|
|
objectRegistryKeyHandle |
RegistryKey |
Registry key path |
|
|
objectRegistryValue |
RegistryValue |
Registry value name |
|
|
mimeType |
- |
MIME type or content type of the response body |
|
|
objectType |
- |
Object type |
|
|
processFilePath |
|
Image path of the subject process |
|
|
suid |
UserAccount |
User name or mailbox |
|
|
suser |
EmailSender |
Email sender |
|
|
duser |
EmailRecipient |
Email receipient |
|
|
mailMsgSubject |
EmailSubject |
Message subject |
|
|
msgId |
EmailMessageID |
Internet message ID |
|
|
techniqueId |
Technique |
Technique ID detected by the product agent base on a detection rule |
- |
- |
tags |
|
Technique ID detected by XDR base on an alert filter |
|
|
tacticId |
Tactic |
List of MITRE tactic IDs |
|
|
ruleName |
- |
Name of the rule that triggered the event |
|
|
ruleId |
- |
ID of a rule |
|
|
malName |
- |
Name of the malware detected |
|
|
malType |
- |
Type of the malware detected |
|
|
eventName |
- |
Event type name |
|
|
eventSubName |
- |
Event type subName |
|
|
subRuleId |
- |
ID of a subordinate rule |
|
|
subRuleName |
- |
Subrule name |
|
|
remarks |
- |
Additional information |
|
|
fullPath |
FileFullPath |
A combination of the file path and file name, introduced by SAE |
|
|
parentCmd |
CLICommand |
Command line of a subject's parent process |
|
|
parentFilePath |
FileFullPath |
Full path of a subject's parent process |
|
|
parentFileHashSha1 |
FileSHA1 |
SHA-1 of a subject's parent process |
|
|
parentFileHashSha256 |
FileSHA2 |
SHA-256 of a subject's parent process |
|
|
parentFileHashMd5 |
FileMD5 |
MD5 of a subject's parent process |
|
|
processFileHashSha1 |
FileSHA1 |
SHA-1 of a subject process |
|
|
processFileHashSha256 |
FileSHA2 |
SHA-256 of a subject process |
|
|
processFileHashMd5 |
FileMD5 |
MD5 of a subject process |
|
|
objectPayloadFileHashSha1 |
FileSHA1 |
SHA-1 of an object payload file |
- |
- |
objectTargetProcess |
- |
File path of the target process that API perform to. For example, process of "a.exe" dumps credential from lsass.exe. |
|
- |
srcFilePath |
FileFullPath |
File path of a source file |
|
- |
srcFileHashSha1 |
FileSHA1 |
SHA-1 of a source file |
- |
- |
srcFileHashSha256 |
FileSHA2 |
SHA-256 of a source file |
- |
- |
srcFileHashMd5 |
FileMD5 |
MD5 of a source file |
- |
- |
policyId |
- |
ID of a policy |
|
|
actResult |
- |
Result of an action |
|
|
scanType |
- |
Scan type |
|
|
productCode |
- |
Product that sent this log |
|
|
malSrc |
FileFullPath |
Malware infection source |
|
|
malDst |
- |
Malware infection destination |
|
|
pname |
- |
Internal product ID (Deprecated, please use productCode instead) |
|
|
pver |
- |
Product version |
|
|
act |
- |
Action taken for the violation |
|
|
deviceGUID |
- |
GUID of the agent which reported this detection |
|
|
isHidden |
- |
Whether to show this detection log generated for a grey rule match |
|
|
severity |
- |
The severity of the event |
|
|
objectIp |
|
IP address of a domain |
|
|
domainName |
DomainName |
Detected domain name |
|
|
peerHost |
DomainName |
Hostname of peerIp |
|
|
httpReferer |
URL |
HTTP referer |
|
|
data1 |
- |
Deep Discover Inspector correlation log metadata |
|
|
targetShare |
FileFullPath |
For HTTPS protocol: Subject State or Province Name; For SMB protocol: Shared folder |
|
|
botCmd |
CLICommand |
Bot command |
|
|
objectName |
- |
Base name of an object file or process |
|
|
dUser1 |
- |
The latest logon user of the destination |
|
|
processUser |
UserAccount |
User name of the process or file creator |
|
|
sUser1 |
- |
The latest logon user of the source |
|
|
msgUuid |
- |
Unique email ID |
|
|
orgId |
- |
Cloud App Security organization ID |
|
|
cve |
- |
CVE identifier |
|
|
cves |
- |
CVEs associated with this filter |
|
|
requestBase |
- |
Domain of the 'request' URL |
|
|
urlCat |
- |
Category of the requested URL |
|
|
userDepartment |
- |
User department |
|
|
sender |
- |
Roaming users or the gateway where the web traffic passed |
|
|
policyName |
- |
Name of the triggered policy |
|
|
principalName |
- |
User principal name used to log on to the proxy |
|
|
profile |
- |
Name of the Threat Protection rule or Data Loss Prevention rule triggered |
|
|
application |
- |
Name of the requested application |
|
|
app |
- |
Network protocol being exploited |
|
|
majorVirusType |
- |
Virus type |
|
|
eventSourceType |
- |
Event source type |
|
|
version |
- |
Version |
|
|
eventTime |
- |
Event generation time on the agent side |
|
|
customerId |
- |
Customer ID, CLP ID, or Company ID |
|
|
receivedTime |
- |
XDR log received time |
|
|
packageTraceId |
- |
Package trace id |
|
|
tenantGuid |
- |
Tenant GUID |
|
|
bitwiseFilterRiskLevel |
- |
Bitwise filter level (to help search performance) |
|
|
detectionName |
- |
A general name for the detection |
|
|
score |
- |
Web Reputation Services URL rating |
|
|
targetType |
- |
The target object type |
|
|
endpointModel |
- |
Mobile device model |
|
|
appPkgName |
- |
App package name |
|
|
appLabel |
- |
App name |
|
|
appVerCode |
- |
App version code |
|
|
appDL_DeployedKeySha1 |
FileSHA1 |
App public key (SHA-1) |
|
|
appSize |
- |
App size in bytes |
|
|
appDexSha256 |
FileSHA2 |
App dex encoded using SHA-256 |
|
|
appIsSystem |
- |
Whether the app is a system app |
|
|
osName |
- |
OS name |
|
|
osVer |
- |
OS version |
|
|
minorVirusType |
- |
Minor virus type |
|
|
flowId |
- |
Connection ID |
|
|
rawDataStr |
- |
JSON string containing of additional information |
|
|
denyListFileHashSha256 |
- |
SHA-256 of User-Defined Suspicious Object |
|
|
clientIP |
- |
Internal IP address of source endpoint |
|
|
detectionType |
- |
Scan type |
|
|
fileType |
- |
The type of file which violated the policy |
|
|
fileSize |
- |
The size of file which violated the policy |
|
|
aggregatedCount |
- |
Number of raw logs |
|
|
rt |
- |
Local time when the event was generated |
|
|
rt_utc |
- |
UTC time when the event was generated |
|
|
Product |
pname Value |
---|---|
Trend Micro Apex One (Windows Security Agent) |
533 |
Trend Micro Apex One (Mac Security Agent) |
620 |
Trend Micro XDR Endpoint Agent |
751 |
Trend Micro Apex One (Deep Security Linux Agent) |
2200 |
Deep Security |
2200 |
Deep Security Virtual Appliance |
2201 |
Deep Security Relay |
2202 |
Deep Security Manager |
2203 |
Deep Security MANIFEST |
2211 |
Deep Security Relay Manifest |
2212 |
Deep Security Rules Updates |
2213 |
Deep Security Smart Check 1 |
2214 |