diff --git a/doc_v2/Cloud/Agentless Vulnerability & Threat Detection.yaml b/doc_v2/Cloud/Agentless Vulnerability & Threat Detection.yaml new file mode 100644 index 0000000..295f21f --- /dev/null +++ b/doc_v2/Cloud/Agentless Vulnerability & Threat Detection.yaml @@ -0,0 +1,701 @@ +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointIp + ProductCode: + - sds + - pds + - sao + - ptp + - stp + - ptn + - sss + - ddr + Description_EN: The IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileName + ProductCode: + - pdi + - xns + - sao + - sfs + - sfc + - sds + - sss + - scs + Description_EN: The file name of the compressed file + Sample: + - /proc/32058/fd/150 + - NONAMEFL + - /proc/10006/fd/30 + - VirusActionSample/RPF2_OtherMalwareSample-other.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileHash + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-1 of the decompressed archive + Sample: + - 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA + - FA71B59F35F0EE44D27F74917EF5A0DA2797E80B + - 14D2302172EB81465CE12E01361AE24CDE170F7B + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHashSha256 + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-256 of the compressed suspicious file + Sample: + - 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F + - 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE + - 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubName + ProductCode: + - sao + - sca + - sds + - sem + - xes + - sig + - sss + Description_EN: The event type sub-name + Sample: + - IPS Detection + - Personal Firewall + - Attack Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudProvider + ProductCode: + - sds + - sfc + - sss + Description_EN: The service provider of the cloud asset + Sample: + - alibaba cloud + - aws + - azure + - gcp + - oci + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vpcId + ProductCode: + - sds + - sss + Description_EN: The virtual private cloud that contains the cloud asset + Sample: + - vpc-01234567890abcdef + - avtd-vnet-ozyww04h + - ocid1.vnic.oc1.iad.abuwcljs4szq5rylkxikcthyegnqn5mjhkyn3xwtoa3uvbonxqn52nofibgq + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileType + ProductCode: + - pdi + - xns + - sfs + - sfc + - sss + Description_EN: The file type of the decompressed archive file + Sample: + - EXE + - JAVA + - PDF + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileSize + ProductCode: + - pdi + - xns + - sig + - sao + - sfs + - sfc + - sss + Description_EN: The file size of the suspicious file + Sample: + - '0' + - '1255856' + - '1237880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - pdi + - xns + - sig + - sfs + - sfc + - sss + - scs + Description_EN: The file type of the suspicious file + Sample: + - EXE + - LNK + - MIME + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osName + ProductCode: + - sig + - ams + - szn + - ddr + - sss + Description_EN: The host OS name + Sample: + - Linux + - windows 10.0.22000 + - windows 10.0.19044 + - windows 10.0.19043 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: threatType + ProductCode: + - pdi + - xns + - sao + - sss + Description_EN: The log threat type + Sample: + - '2' + - '99' + - '5' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: instanceId + ProductCode: + - sao + - xes + - sds + - sss + - mns + Description_EN: The ID of the instance that indicates the meta-cloud or data + center VM + Sample: + - 52294e7b-f732-c6e9-b2c3-7a6b6f50d101 + - 00030912-c5e7-4348-9012-7c684751c531 + - 0008ae58-db0c-34ee-3e5c-5dfc9b10a739 + - i-0b22a22eec53b9321 + - /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0 + - ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudAccountId + ProductCode: + - sfc + - sss + Description_EN: The AWS cloud account ID, Google Cloud product ID, or Azure + subscription ID + Sample: + - '123456789012' + - 00000000-0000-0000-0000-000000000000 + - ocid1.compartment.oc1..aaaaaaaa54yuau7prqquu3gqs4jcjzvz2yf7vwlqnkqlixq5tcjsdezqmyua + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: regionCode + ProductCode: + - sfc + - sss + Description_EN: The cloud provider region code + Sample: + - us-east-1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudResourceId + ProductCode: + - sss + Description_EN: The cloud resource ID + Sample: + - vol-00000000000000000 + - 123456789012.dkr.ecr.us-west-1.amazonaws.com/us-west-1-sentry-scan-samples-ecr + - arn:aws:lambda:us-east-1:000000000000:function:StackSet-SentrySetdb47aff3-cc084aaa-5-sideScanVuln-6Dyn7ZcwCSPw + - '6132111784399111342' + - us-east1-docker.pkg.dev/987654321012/ebsscan/ebsscanfunction@sha256:49eb55144d868a5bea1487e35837115f51eb158361c2c11beb6935667a04c489 + - /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/csf-test-data/providers/Microsoft.Compute/disks/csf-test-shared-ssd + - ocid1.volume.oc1.iad.abuwcljsobhbezpfpgajgxecncmdjxxq5yiyimx4tdtzm33gawvhvfvn62iq + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudResourceType + ProductCode: + - sss + Description_EN: The cloud resource type + Sample: + - alibaba-cloud-repository-image + - azure-repository-image + - disk + - ebs-volume + - ecr-repository-image + - lambda-function + - lambda-layer + - google-cloud-repository-image + - oracle-cloud-repository-image + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: cloudResourceDigest + ProductCode: + - sss + Description_EN: The cloud resource digest + Sample: + - sha256:e8759728bdf756c2546bf88d772634d4b746ba2be6da74cb68d2a75fb135e29e + - Z29gD6/9+UmEejeSqt4zcqux+1nNIRdGhoffijjkaBc= + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: cloudResourceTags + ProductCode: + - sss + Description_EN: The cloud resource tags + Sample: + - imageTags: [latest, Tag1, Tag2] + - tags: {Service: S3 Updater, Department: Finance, Application: Accounting} + - CloudResourceTags: [{Key: cost_tag, Value: Department 123}] + - ImageTags: [latest] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudResourceVersion + ProductCode: + - sss + Description_EN: The cloud resource version + Sample: + - 113 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: cloudMachineImageId + ProductCode: + - sss + Description_EN: The cloud machine image ID + Sample: + - ami-092d1c9fb626c2ba7 + - 3111106172944240963 + - Oracle-Linux-9.5-aarch64-2025.05.19-0 + - ubuntu_22_04_x64_20G_alibase_20250113.vhd + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: cloudMachineImageName + ProductCode: + - sss + Description_EN: The cloud machine image name + Sample: + - Windows_Server-2022-English-Full-SQL_2022_Standard-2024.05.15 + - https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/debian-12-bookworm-v20240617 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: diskPartitionId + ProductCode: + - sss + Description_EN: The cloud volume partition ID + Sample: + - 0 + - 1 + - 2 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: azId + ProductCode: + - sss + Description_EN: The virtual machine Availability Zone ID + Sample: + - us-east-1b + - us-west-2a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileSystemUuid + ProductCode: + - sss + Description_EN: The file system UUID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Cloud/File Security Storage.yaml b/doc_v2/Cloud/File Security Storage.yaml new file mode 100644 index 0000000..ce59ac0 --- /dev/null +++ b/doc_v2/Cloud/File Security Storage.yaml @@ -0,0 +1,440 @@ +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileName + ProductCode: + - pdi + - xns + - sao + - sfs + - sfc + - sds + - sss + - scs + Description_EN: The file name of the compressed file + Sample: + - /proc/32058/fd/150 + - NONAMEFL + - /proc/10006/fd/30 + - VirusActionSample/RPF2_OtherMalwareSample-other.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: filePath + ProductCode: + - sds + - pds + - sao + - pdi + - xns + - pts + - sfs + - sfc + Description_EN: The file path without the file name + Sample: + - security + - /var/log/audit/audit.log + - application + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileHash + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-1 of the decompressed archive + Sample: + - 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA + - FA71B59F35F0EE44D27F74917EF5A0DA2797E80B + - 14D2302172EB81465CE12E01361AE24CDE170F7B + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHashSha256 + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-256 of the compressed suspicious file + Sample: + - 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F + - 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE + - 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: majorVirusType + ProductCode: + - pds + - sds + - ams + - ptn + - pts + - sfc + Description_EN: The virus type + Sample: + - Virus + - Suspicious Activity + - Trojan + - TROJ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudProvider + ProductCode: + - sds + - sfc + - sss + Description_EN: The service provider of the cloud asset + Sample: + - alibaba cloud + - aws + - azure + - gcp + - oci + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileSize + ProductCode: + - pdi + - xns + - sfs + - sfc + Description_EN: The file size of the decompressed archive file + Sample: + - '0' + - '265314' + - '175864' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileType + ProductCode: + - pdi + - xns + - sfs + - sfc + - sss + Description_EN: The file type of the decompressed archive file + Sample: + - EXE + - JAVA + - PDF + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileSize + ProductCode: + - pdi + - xns + - sig + - sao + - sfs + - sfc + - sss + Description_EN: The file size of the suspicious file + Sample: + - '0' + - '1255856' + - '1237880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - pdi + - xns + - sig + - sfs + - sfc + - sss + - scs + Description_EN: The file type of the suspicious file + Sample: + - EXE + - LNK + - MIME + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudStorageName + ProductCode: + - sfc + Description_EN: The cloud storage name + Sample: + - my-bucket + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: cloudAccountId + ProductCode: + - sfc + - sss + Description_EN: The AWS cloud account ID, Google Cloud product ID, or Azure + subscription ID + Sample: + - '123456789012' + - 00000000-0000-0000-0000-000000000000 + - ocid1.compartment.oc1..aaaaaaaa54yuau7prqquu3gqs4jcjzvz2yf7vwlqnkqlixq5tcjsdezqmyua + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: regionCode + ProductCode: + - sfc + - sss + Description_EN: The cloud provider region code + Sample: + - us-east-1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: awsResourceArn + ProductCode: + - sfc + Description_EN: The Amazon Resource Name + Sample: + - arn:aws:s3:::bucket-name/object-key + - arn:aws:s3:::user-bucket-name/file-name + - arn:aws:s3:::bucket-name/folder-name/file-name + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false diff --git a/doc_v2/Cloud/File Security.yaml b/doc_v2/Cloud/File Security.yaml new file mode 100644 index 0000000..99dc1e7 --- /dev/null +++ b/doc_v2/Cloud/File Security.yaml @@ -0,0 +1,553 @@ +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileName + ProductCode: + - pdi + - xns + - sao + - sfs + - sfc + - sds + - sss + - scs + Description_EN: The file name of the compressed file + Sample: + - /proc/32058/fd/150 + - NONAMEFL + - /proc/10006/fd/30 + - VirusActionSample/RPF2_OtherMalwareSample-other.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: filePath + ProductCode: + - sds + - pds + - sao + - pdi + - xns + - pts + - sfs + - sfc + Description_EN: The file path without the file name + Sample: + - security + - /var/log/audit/audit.log + - application + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileHash + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-1 of the decompressed archive + Sample: + - 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA + - FA71B59F35F0EE44D27F74917EF5A0DA2797E80B + - 14D2302172EB81465CE12E01361AE24CDE170F7B + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHashSha256 + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-256 of the compressed suspicious file + Sample: + - 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F + - 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE + - 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectType + ProductCode: + - sca + - sds + - sao + - sem + - xes + - sfs + Description_EN: The object type + Sample: + - file + - process + - qil + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileSize + ProductCode: + - pdi + - xns + - sfs + - sfc + Description_EN: The file size of the decompressed archive file + Sample: + - '0' + - '265314' + - '175864' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileType + ProductCode: + - pdi + - xns + - sfs + - sfc + - sss + Description_EN: The file type of the decompressed archive file + Sample: + - EXE + - JAVA + - PDF + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: engType + ProductCode: + - sao + - sfs + Description_EN: The engine type + Sample: + - Virus Scan Engine (Windows XP/Server 2003, x64) + - Virus Scan NT Kernel Engine + - Spyware/Grayware Scan Engine v.6 (64-bit) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: engVer + ProductCode: + - xes + - sca + - sao + - sfs + Description_EN: The engine version + Sample: + - 1.0.0.1123_1.0.0.1101 + - 9.0.1004 + - 22.540.1001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileSize + ProductCode: + - pdi + - xns + - sig + - sao + - sfs + - sfc + - sss + Description_EN: The file size of the suspicious file + Sample: + - '0' + - '1255856' + - '1237880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - pdi + - xns + - sig + - sfs + - sfc + - sss + - scs + Description_EN: The file type of the suspicious file + Sample: + - EXE + - LNK + - MIME + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malFamily + ProductCode: + - pdi + - xns + - sao + - sds + - sfs + Description_EN: The threat family + Sample: + - EQUATED + - STARTER + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malSubType + ProductCode: + - sao + - sfs + Description_EN: The subsidiary virus type + Sample: + - Unknown + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malType + ProductCode: + - pdi + - xns + - sds + - sao + - pds + - sfs + - scs + Description_EN: The risk type for Network Content Correlation Engine rules + Sample: + - OTHERS + - MALWARE + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malTypeGroup + ProductCode: + - pdi + - xns + - sfs + Description_EN: The risk type group for NCCE (Network Content Correlation + Engine) rules. This field comes from NCCP (Network Content Correlation + Pattern) rule type definitions. + Sample: + - Others + - Malware + - Spyware + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: confidence + ProductCode: + - sao + - sfs + Description_EN: The confidence rating returned from TrendX Hybrid Model + (predictive machine learning). Values from 1-99. + Sample: + - 94 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: reportGUID + ProductCode: + - sca + - sfs + - pdi + - xns + Description_EN: The GUID for Workbench to request report page data + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: customTags + ProductCode: + - scs + - sfs + Description_EN: The event tags + Sample: + - network + - mitre_discovery + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Cloud/Trend Vision One Container Security.yaml b/doc_v2/Cloud/Trend Vision One Container Security.yaml new file mode 100644 index 0000000..9b12a7a --- /dev/null +++ b/doc_v2/Cloud/Trend Vision One Container Security.yaml @@ -0,0 +1,1325 @@ +- Name: endpointHostName + ProductCode: + - scs + Description_EN: The host name of the container or node + Sample: + - PHILIPSIBE09 + - WHAM6WK8XG2 + - MacBook-Pro-del-Meno + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: eventId + ProductCode: + - scs + Description_EN: Event type + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubId + ProductCode: + - scs + Description_EN: The access type + Sample: + - 2 - TELEMETRY_PROCESS_CREATE + - 101 - TELEMETRY_FILE_CREATE + - 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventTime + ProductCode: + - scs + Description_EN: The time the agent detected the event + Sample: + - 1657781088000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFilePath + ProductCode: + - scs + Description_EN: The file path of the target process image or target file + Sample: + - /usr/bin/bash + - /bin/bash + - /opt/folder1/probes/system/processes/processes + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: srcFilePath + ProductCode: + - scs + Description_EN: The source file path + Sample: + - \\cnva-apps\megaclockprod\traveler\travelerprint.accdb + - c:\program files\common files\microsoft + shared\clicktorun\officesvcmgrschedule.xml + - q:\a7_dbs\a4_pkg\a4_packaging.accde + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: tags + ProductCode: + - ALL + - scs + Description_EN: The detected ID based on the alert filter + Sample: + - MITREV9.T1057 + - MITREV9.T1059.003 + - XSAE.F2924 + DL_Type: dynamic + DL_CommonKey: + - Technique + - Tactic + DL_Searchable: true + DL_Aggregable: true +- Name: pver + ProductCode: + - scs + Description_EN: The product version + Sample: + - 1.2.0.2752 + - 1.0.345 + - 1.2.0.2657 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clusterId + ProductCode: + - scs + Description_EN: The cluster ID of the container + Sample: + - TestCluster-2HJdImvH6eO1fgTnCBK3xYA7Sph + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: clusterName + ProductCode: + - scs + Description_EN: The cluster name of the container + Sample: + - TestCluster + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: k8sNamespace + ProductCode: + - scs + Description_EN: The Kubernetes namespace of the container + Sample: + - default + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: k8sPodName + ProductCode: + - scs + Description_EN: The Kubernetes pod name of the container + Sample: + - longrunl + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: k8sPodId + ProductCode: + - scs + Description_EN: The Kubernetes pod ID of the container + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: containerName + ProductCode: + - scs + Description_EN: The Kubernetes container name + Sample: + - k8s_democon_longrunl_default_11111111-1111-1111-1111-111111111111_0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: containerId + ProductCode: + - scs + Description_EN: The Kubernetes container ID + Sample: + - 7d1e00176d78 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: containerImage + ProductCode: + - scs + Description_EN: The Kubernetes container image + Sample: + - debian:latest + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: containerImageDigest + ProductCode: + - scs + Description_EN: The Kubernetes container image digest + Sample: + - sha256:bfe6615d017d1eebe19f349669de58cda36c668ef916e618be78071513c690e5 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: ruleIdStr + ProductCode: + - scs + Description_EN: The rule ID + Sample: + - TM-00000036 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: policyId + ProductCode: + - scs + Description_EN: The policy ID + Sample: + - TestPolicy-2HJe25H4GY4upSuNNAG1pci2BIm + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: policyName + ProductCode: + - scs + Description_EN: The name of the triggered policy + Sample: + - TestPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: processCmd + ProductCode: + - scs + Description_EN: Command line entry of subject process + Sample: + - C:\WINDOWS\system32\services.exe + - C:\Windows\system32\services.exe + - /sbin/launchd + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: parentCmd + ProductCode: + - scs + Description_EN: The command line entry of the parent process + Sample: + - C:\WINDOWS\system32\services.exe + - C:\Windows\system32\services.exe + - /sbin/launchd + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: processFilePath + ProductCode: + - scs + Description_EN: The file path of the subject process + Sample: + - c:\windows\system32\services.exe + - /usr/bin/bash + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + - ProcessFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: parentFilePath + ProductCode: + - scs + Description_EN: The file path of the parent process + Sample: + - c:\windows\system32\services.exe + - /usr/bin/bash + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: processLaunchTime + ProductCode: + - scs + Description_EN: The time the subject process was launched + Sample: + - '1653614773895' + - '1656118625928' + - '0' + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: processName + ProductCode: + - scs + Description_EN: The image name of the process that triggered the event + Sample: + - /usr/bin/bash + - c:\windows\system32\svchost.exe + - c:\windows\system32\lsass.exe + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: true +- Name: parentName + ProductCode: + - scs + Description_EN: The image name of the parent process + Sample: + - /usr/bin/bash + - c:\windows\system32\svchost.exe + - c:\windows\system32\lsass.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: parentLaunchTime + ProductCode: + - scs + Description_EN: The time when the parent process was launched + Sample: + - '1653614773895' + - '1656118625928' + - '0' + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: processPid + ProductCode: + - scs + Description_EN: The PID of the subject process + Sample: + - 4 + - 1 + - 784 + - 792 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPid + ProductCode: + - scs + Description_EN: The PID of the parent process + Sample: + - 4 + - 1 + - 784 + - 792 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dpt + ProductCode: + - scs + Description_EN: The destination port number + Sample: [] + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - scs + Description_EN: The destination IP address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - scs + Description_EN: The source port number + Sample: + - 53 + - 5353 + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - scs + Description_EN: The source address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: proto + ProductCode: + - scs + Description_EN: The protocol type + Sample: + - TELEMETRY_CONNECTION_TCP + - TELEMETRY_CONNECTION_UDP + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectUser + ProductCode: + - scs + Description_EN: The owner name of the target process or the login user name + Sample: + - root + - SYSTEM + - oracle + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: osName + ProductCode: + - scs + Description_EN: The host operating system name + Sample: + - Linux + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: customAssetTags + ProductCode: + - scs + Description_EN: The list of custom asset tags + Sample: + - '{"os":["linux", "windows"], "org":["bu1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: platformAssetTags + ProductCode: + - scs + Description_EN: The list of platform custom asset tags + Sample: + - '{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: objectFileName + ProductCode: + - sao + - scs + - sds + Description_EN: The object file name + Sample: + - powershell.exe + - wmiprvse.exe + - dismhost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileName + ProductCode: + - pdi + - xns + - sao + - sfs + - sfc + - sds + - sss + - scs + Description_EN: The file name of the compressed file + Sample: + - /proc/32058/fd/150 + - NONAMEFL + - /proc/10006/fd/30 + - VirusActionSample/RPF2_OtherMalwareSample-other.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectFilePath + ProductCode: + - sao + - sds + - xes + - scs + Description_EN: The file path of the target process image or target file + Sample: + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - zwwritevirtualmemory + - c:\windows\system32\wbem\wmiprvse.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: processCmd + ProductCode: + - sds + - xes + - pds + - sao + - scs + Description_EN: The subject process command line + Sample: + - '"C:\Program Files (x86)\AADM\AADM.exe" ' + - /usr/lib/inet/sendmail -bl -q15m + - ComDir + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: parentCmd + ProductCode: + - xes + - scs + Description_EN: The command line of the subject parent process + Sample: + - '"C:\Tiburon\CommandCAD\Test\Startup.exe" ' + - C:\WINDOWS\Explorer.EXE + - C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s Appinfo + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: policyId + ProductCode: + - ptp + - sao + - xes + - stp + - sds + - pds + - scs + Description_EN: The policy ID of which the event was detected + Sample: + - 00000001-0001-0001-0001-000000007610 + - '007' + - '003' + - TM000001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: policyName + ProductCode: + - sao + - sca + - sws + - sem + - sig + - ptn + - scs + - mns + Description_EN: The name of the triggered policy + Sample: + - Steelcase + - Cabot + - Tigre - Medium Policy + - apiPostedPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileType + ProductCode: + - pdi + - xns + - sig + - sfs + - sfc + - sss + - scs + Description_EN: The file type of the suspicious file + Sample: + - EXE + - LNK + - MIME + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malType + ProductCode: + - pdi + - xns + - sds + - sao + - pds + - sfs + - scs + Description_EN: The risk type for Network Content Correlation Engine rules + Sample: + - OTHERS + - MALWARE + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processName + ProductCode: + - sds + - xes + - pds + - scs + - sao + Description_EN: The image name of the process that triggered the event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: false +- Name: processPid + ProductCode: + - sds + - xes + - scs + Description_EN: The PID of the subject process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: proto + ProductCode: + - sds + - pds + - ptn + - scs + - mns + Description_EN: The exploited layer network protocol + Sample: + - '6' + - TCP + - '17' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileDesc + ProductCode: + - sao + - scs + Description_EN: The file description + Sample: + - Atualiza PJRO + - Carpeta de archivos + - 7z Setup SFX (x86) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sourceType + ProductCode: + - sao + - scs + - xes + Description_EN: The source type + Sample: + - user defined + - sandbox + - syscall + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: parentName + ProductCode: + - xes + - scs + Description_EN: The image name of the parent process + Sample: + - explorer.exe + - startup.exe + - svchost.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPid + ProductCode: + - sds + - xes + - pds + - scs + Description_EN: The PID of the parent process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: customTags + ProductCode: + - scs + - sfs + Description_EN: The event tags + Sample: + - network + - mitre_discovery + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clusterId + ProductCode: + - scs + Description_EN: The cluster ID of the container + Sample: + - ben_eks_test-20k90A3jGa4d3YMYfrdGIgs7g9u + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clusterName + ProductCode: + - scs + Description_EN: The cluster name of the container + Sample: + - ben_eks_test + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: k8sNamespace + ProductCode: + - scs + Description_EN: The Kubernetes namespace of the container + Sample: + - default + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: k8sPodName + ProductCode: + - scs + Description_EN: The Kubernetes pod name of the container + Sample: + - ubuntu-ds-fp2jk + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: k8sPodId + ProductCode: + - scs + Description_EN: The Kubernetes pod ID of the container + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: containerName + ProductCode: + - scs + Description_EN: The Kubernetes container name + Sample: + - k8s_ubuntu_ubuntu-ds-fp2jk_default_00000000-0000-0000-0000-000000000000_2 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: containerId + ProductCode: + - scs + Description_EN: The Kubernetes container ID + Sample: + - 4102001853b8 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: containerImage + ProductCode: + - scs + Description_EN: The Kubernetes container image + Sample: + - dockerhub.io/ubuntu:latest + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: containerImageDigest + ProductCode: + - scs + Description_EN: The Kubernetes container image digest + Sample: + - sha256:626ffe58f6e7566e00254b638eb7e0f3b11d4da9675088f4781a50ae288f3322 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleSetName + ProductCode: + - scs + - stp + - ptp + - sds + Description_EN: The rule set name + Sample: + - AllRules + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleSetId + ProductCode: + - scs + Description_EN: The rule set ID + Sample: + - AllRules-1zSSZPsDqfqkcOt5vNsD6f383HN + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleIdStr + ProductCode: + - scs + Description_EN: The rule ID + Sample: + - TM-00000043 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processImagePath + ProductCode: + - sds + - xes + - pds + - scs + Description_EN: The process triggered by the file event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rawDataStr + ProductCode: + - pdi + - xns + - scs + - xns + Description_EN: The JSON string that contains additional information + Sample: + - '{"TLS version": "0x0303", "Cipher Suite": "0xc030"}' + - '{"Scanned ports": "23, 80, 443"}' + - '{"HTTP Content-Type": "application/hal+json", "HTTP Content-Body": "{\\"_links\\": + {\\"type\\": {\\"href\\": \\"http://10.10.10.10/rest/type/node/INVALID_VALUE\\"}}, + \\"type\\": {\\"target_id\\": \\"article\\"}, \\"title\\": {\\"value\\": \\"My + Article\\"}, \\"body\\": {\\"value\\": \\"\\"}}"}' + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: customAssetTags + ProductCode: + - xes + - sds + - sao + - scs + Description_EN: The list of custom asset tags + Sample: + - '{"os":["linux", "windows"], "org":["bu1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: platformAssetTags + ProductCode: + - xes + - sds + - sao + - scs + Description_EN: The list of platform custom asset tags + Sample: + - '{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Cloud/XDR for Cloud - AWS VPC Flow Logs.yaml b/doc_v2/Cloud/XDR for Cloud - AWS VPC Flow Logs.yaml new file mode 100644 index 0000000..138d5f1 --- /dev/null +++ b/doc_v2/Cloud/XDR for Cloud - AWS VPC Flow Logs.yaml @@ -0,0 +1,363 @@ +- Name: eventTime + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The time the agent or product detected the event + Sample: + - 1657135700000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dst + ProductCode: + - sig + - szn + - vpc + - azv + Description_EN: The destination IP address (dstaddr) + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - sig + - szn + - vpc + - azv + Description_EN: The source IP address (srcaddr) + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The name of the log event + Sample: + - SWG_ACTIVITY_LOG + - FIREWALL_ACTIVITY_LOG + - VPC_ACTIVITY_LOG + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sig + - pdi + - xns + - vpc + - azv + Description_EN: The product name + Sample: + - Secure Web Gateway + - XDR for Cloud - AWS VPC Flow Logs + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: spt + ProductCode: + - szn + - vpc + - azv + Description_EN: The virtual port of the source assigned to the Secure Access + Module (srcport) + Sample: + - 57763 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - szn + - vpc + - azv + Description_EN: The service destination port of the private application server + (dstport) + Sample: + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: start + ProductCode: + - vpc + Description_EN: The time when the first data packet was received (in Unix + seconds) + Sample: + - 1616729292 + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: end + ProductCode: + - vpc + Description_EN: The time when the last data packet was received (in Unix + seconds) + Sample: + - 1616729349 + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: eventId + ProductCode: + - xns + - pdi + - vpc + - azv + Description_EN: The event ID + Sample: + - '200139' + - '200140' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: vpcFlowLogsVersion + ProductCode: + - vpc + - azv + Description_EN: The VPC Flow Logs version (version) + Sample: + - 2 + - 3 + - 4 + - 5 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: packets + ProductCode: + - vpc + Description_EN: The number of transmitted data packets + Sample: + - 14 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: bytes + ProductCode: + - vpc + Description_EN: The number of transmitted data bytes + Sample: + - 15044 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: action + ProductCode: + - vpc + Description_EN: The traffic processing action + Sample: + - ACCEPT + - REJECT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: logStatus + ProductCode: + - vpc + Description_EN: The VPC Flow Log status + Sample: + - OK + - NODATA + - SKIPDATA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vpcId + ProductCode: + - vpc + Description_EN: The VPC ID + Sample: + - vpc-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: subnetId + ProductCode: + - vpc + Description_EN: The subnet ID + Sample: + - subnet-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: instanceId + ProductCode: + - vpc + Description_EN: The instance ID + Sample: + - i-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: tcpFlags + ProductCode: + - vpc + Description_EN: The bitmask value of the FIN/SYN/RST/SYN-ACK TCP flags + Sample: + - 1 + - 2 + - 4 + - 18 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: flowType + ProductCode: + - vpc + Description_EN: The type of traffic (type) + Sample: + - IPv4 + - IPv6 + - EFA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pktSrcAddr + ProductCode: + - vpc + Description_EN: The packet level source IP + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: pktDstAddr + ProductCode: + - vpc + Description_EN: The packet level destination IP + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: azId + ProductCode: + - vpc + Description_EN: The Availability Zone ID + Sample: + - apse2-az3 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subLocationType + ProductCode: + - vpc + Description_EN: The sublocation type + Sample: + - wavelength + - outpost + - localzone + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subLocationId + ProductCode: + - vpc + Description_EN: The sublocation ID + Sample: + - lz-0abcd123efg4567h + - op-0abcd123efg4567h + - wz-0abcd123efg4567h + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pktSrcCloudServiceName + ProductCode: + - vpc + Description_EN: The subset IP address range name for cloud service source IP + (pkt-src-aws-service) + Sample: + - AMAZON + - EC2 + - ROUTE53 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pktDstCloudServiceName + ProductCode: + - vpc + Description_EN: The subset IP address range name for cloud service destination + IP (pkt-dst-aws-service) + Sample: + - AMAZON + - EC2 + - ROUTE53 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: flowDirection + ProductCode: + - vpc + - azv + Description_EN: The network interface traffic direction + Sample: + - ingress + - egress + - I + - O + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: trafficPath + ProductCode: + - vpc + Description_EN: The egress traffic path number + Sample: + - 1 + - 2 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Email/Collaboration sensor.yaml b/doc_v2/Email/Collaboration sensor.yaml new file mode 100644 index 0000000..85b0dee --- /dev/null +++ b/doc_v2/Email/Collaboration sensor.yaml @@ -0,0 +1,281 @@ +- Name: applicationId + ProductCode: + - xca + Description_EN: The application ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientIp + ProductCode: + - xca + Description_EN: The client IP + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: correlationId + ProductCode: + - xca + Description_EN: The correlation ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: extraInfo + ProductCode: + - xca + Description_EN: The additional information about the sharing action + Sample: + - SPHomePagesWeb + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: isExternalAccess + ProductCode: + - xca + Description_EN: Whether the cmdlet was run by an external user (True=external + user, False=internal user in your organization) + Sample: + - true + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: targetType + ProductCode: + - xca + Description_EN: The type of object that was accessed or modified + Sample: + - File + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: target + ProductCode: + - xca + Description_EN: The object accessed by a user or application + Sample: + - APCPR000000.PROD.OUTLOOK.COM/Microsoft Exchange Hosted + - Organizations/test.trendmicro.com/test\\testRule001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: actionName + ProductCode: + - xca + Description_EN: The user or service action + Sample: + - UserLoggedIn + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: orgName + ProductCode: + - xca + Description_EN: The tenant name + Sample: + - test.trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: originatingServer + ProductCode: + - xca + Description_EN: The server where the operation originated + Sample: + - TY0PR03MB6449 (15.20.5746.023) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parameters + ProductCode: + - xca + Description_EN: The names and values of all parameters used in the cmdlet + identified in the Operations property + Sample: + - '[{"Name": "AlwaysDeleteOutlookRulesBlob","Value": "False"},{"Name" : "Force","Value": + "False"}]' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: recordType + ProductCode: + - xca + Description_EN: The operation type + Sample: + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: actResult + ProductCode: + - xca + Description_EN: The action result + Sample: + - Success + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: isSensitiveInfo + ProductCode: + - xca + Description_EN: Whether the event contains sensitive information + Sample: + - true + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userSessionId + ProductCode: + - xca + Description_EN: The user session ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudStorageId + ProductCode: + - xca + Description_EN: The file or folder location ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudStorageName + ProductCode: + - xca + Description_EN: The file or folder URL + Sample: + - https://test.trendmicro.com/sites/123 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileExt + ProductCode: + - xca + Description_EN: The file extension (If the object is a folder, there is no + value for this field.) + Sample: + - jpg + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileName + ProductCode: + - xca + Description_EN: The file or folder name + Sample: + - test.pdf + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: userAgent + ProductCode: + - xca + Description_EN: The user agent + Sample: + - Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like + Gecko) Chrome/119.0.0.0 Safari/537.36 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: principalName + ProductCode: + - xca + Description_EN: The User Principal Name + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: userType + ProductCode: + - xca + Description_EN: The user type + Sample: + - Regular + - Reserved + - Admin + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: service + ProductCode: + - xca + Description_EN: The Microsoft 365 service where the activity occurred + Sample: + - SecurityComplianceCenter + - AzureActiveDirectory + - SharePoint + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - xca + Description_EN: The event type + Sample: + - COLLABORATION_ACTIVITY + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubName + ProductCode: + - xca + Description_EN: The event type sub-name + Sample: + - Audit.Exchange + - Audit.Sharepoint + - Audit.General + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventId + ProductCode: + - sca + - sem + - xms + - xca + Description_EN: The event ID + Sample: + - 1 - MESSAGING_EMAIL_META + - 2 - MESSAGING_COLLABORATION_ACTIVITY + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true diff --git a/doc_v2/Email/Email Sensor.yaml b/doc_v2/Email/Email Sensor.yaml new file mode 100644 index 0000000..af5a88e --- /dev/null +++ b/doc_v2/Email/Email Sensor.yaml @@ -0,0 +1,1370 @@ +- Name: attachmentFileName + ProductCode: + - sca + - sem + - pdi + - xns + - xms + Description_EN: The file name of an attachment + Sample: + - Mail Body + - image001.png + - image002.png + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHash + ProductCode: + - pdi + - xns + - xms + Description_EN: The SHA-1 of the email attachment + Sample: + - C9877617DB6715792F9D5C959C1E8D4E56D0C281 + - 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722 + - 0E56D9540B07ED15EF745348D35C72A6A00A0BD9 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: suser + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email sender + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: duser + ProductCode: + - sds + - pds + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email recipient + Sample: + - (no user) + - SYSTEM + - ' SYSTEM' + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: true +- Name: mailMsgSubject + ProductCode: + - sca + - pdi + - xns + - sem + - sao + - xms + Description_EN: The email subject + Sample: + - FW. mail subject + - ManageEngine + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: true +- Name: msgId + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The internet message ID + Sample: + - 66.6.00.0006 + - example.test.com + - dameware1svr + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: subRuleName + ProductCode: + - sds + - pds + - sca + - sem + - xms + Description_EN: The subrule name + Sample: + - Pre-authentication failed. + - 'ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System + Logs,File Deletion ' + - 'ATTACK T1110: Multiple Windows Logon Failures' + - invisible_url_domain + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: msgUuid + ProductCode: + - sca + - sem + - xms + Description_EN: The unique email ID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: orgId + ProductCode: + - sca + - xms + Description_EN: The organization ID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileSize + ProductCode: + - pdi + - xns + - xms + Description_EN: The file size of the email attachment + Sample: + - '190843' + - '104454' + - '112197' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileSizes + ProductCode: + - xms + Description_EN: The file size of email attachments + Sample: + - 190843 + - 104454 + - 112197 + DL_Type: dynamic + DL_Searchable: true +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: mailbox + ProductCode: + - sca + - sem + - ams + - xms + Description_EN: The mailbox that is protected by Trend Micro + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: correlatedIntelligence + ProductCode: + - sem + - xms + Description_EN: The Correlated Intelligence detection + Sample: '{"risk_type": "Anomaly","matched_rules": [{"threat_type": "Possibly Unwanted + Email","matched_filters": [{"id":"FIL013", "name": "Marketing Email Traits"},{"id":"FIL098", + "name": "Infrequent Sender Email Domain"}],"name": "Possibly Unwanted Marketing + Email","id": "AN004"}]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleVer + ProductCode: + - sca + - sds + - sem + - xms + Description_EN: The rule version + Sample: + - '202207060001' + - '202207190001' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachment + ProductCode: + - sca + - xms + Description_EN: The information about the email attachment + Sample: + - '{"attachmentFileTlsh": "", "attachmentFileName": "testfile.txt","attachmentFileHash": + "","attachmentFileSize": "-1"}' + DL_Type: dynamic + DL_Searchable: true +- Name: highlightedFileName + ProductCode: + - sca + - xms + Description_EN: The file names of suspicious attachments + Sample: + - detect_me.zip + - covid.zip + DL_Type: dynamic + DL_Searchable: true +- Name: attachmentFileHashs + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 hash value of the attachment file + Sample: + - 056a2975edffe7188c03c324ae4335f9380b57e3 + - 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 of the email attachment + Sample: + - 056a2975edffe7188c03c324ae4335f9380b57e3 + - 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a + DL_Type: dynamic + DL_Searchable: true +- Name: attachmentFileTlshs + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH hash value of the attachment file + Sample: + - '' + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileTlshes + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH of the email attachment + Sample: + - '' + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189 + DL_Type: dynamic + DL_Searchable: true +- Name: highlightedFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 hashes of the highlighted file + Sample: + - C9877617DB6715792F9D5C959C1E8D4E56D0C281 + - 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722 + - 0E56D9540B07ED15EF745348D35C72A6A00A0BD9 + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgDirection + ProductCode: + - sca + - sem + - xms + Description_EN: The direction of the email message + Sample: + - 1 + DL_Type: int +- Name: mailDirection + ProductCode: + - sca + - sem + - xms + Description_EN: Email traffic direction + Sample: + - 1 + - 3 + - 25 + DL_Type: int +- Name: eventTime + ProductCode: + - sca + - sem + - xms + Description_EN: The time the agent detected the event + Sample: + - 1657135700000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sca + - sem + - xms + Description_EN: Internal product code (depricated) + Sample: + - '733' + - '742' + - TMEMS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: msgUuid + ProductCode: + - sca + - sem + - xms + Description_EN: Internal email UUID to identify each email message + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailbox + ProductCode: + - sca + - xms + Description_EN: Primary email address + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: mailDirection + ProductCode: + - sca + - sem + - xms + Description_EN: Email traffic direction + Sample: + - 1 + - 3 + - 25 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFromAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail from address in email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: mailToAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail To address in the email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgSubject + ProductCode: + - sca + - sem + - xms + Description_EN: Email subject + Sample: + - Your daily briefing + - 'Security alert for DeleteSecurityGroup on Account 549918006255 in Region: ap-southeast-1' + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgId + ProductCode: + - sca + - sem + - xms + Description_EN: Email ID + Sample: + - + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: true +- Name: mailCcAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail CC address in the email header + Sample: + - + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailBccAddresses + ProductCode: + - sem + - sca + - xms + Description_EN: Mail BCC address in the email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailSenderIp + ProductCode: + - sca + - sem + - xms + Description_EN: Email sender IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: mailAttachmentHash + ProductCode: + - sca + - sem + - xms + Description_EN: Hash value of the email attachment + Sample: + - 02ab50ee0bccadb43d6cc504928f2ff2 + - 0a0f335fb04f1acebb7500d5358321c0 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: mailUrlsRealLink + ProductCode: + - sca + - sem + - xms + Description_EN: URL extracted from the email content + Sample: + - https://aka.ms/JoinTeamsMeeting + - http://go.microsoft.com/fwlink/p/?LinkID=12345 + DL_Type: dynamic + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: mailSourceDomain + ProductCode: + - sca + - xms + Description_EN: Email domain of the sender + Sample: + - example.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: mailUrlsVisibleLink + ProductCode: + - sca + - sem + - xms + Description_EN: URL extracted from the email content + Sample: + - Unsubscribe + - Android + DL_Type: dynamic + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: orgId + ProductCode: + - sca + - xms + Description_EN: The organization ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileName + ProductCode: + - sca + - sem + - xms + Description_EN: File name of the email attachment + Sample: + - image001.png + - image002.png + - image003.png + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSha1 + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-1 hash of the email attachment + Sample: + - 03d8fb85556edf397d8afcafc0b13f11ecbde50c + - 056a2975edffe7188c03c324ae4335f9380b57e3 + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentMd5 + ProductCode: + - sca + - sem + - xms + Description_EN: MD5 hash of the email attachment + Sample: + - 003fa299ab119219596f952c68029810 + - 03aeabf6a745cb627ee29c05a22e58cb + DL_Type: dynamic + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSha256 + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-256 hash of the email attachment + Sample: + - 29d72af5608ee5eade7c4346d3c32dfcc6b54f8fb43d977ff0306ad68b255a01 + - cb0628092ddea96bb040221b5c793dbbb792a67d0621bdfba170c07374d85801 + DL_Type: dynamic + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentUrls + ProductCode: + - sem + - xms + Description_EN: The URLs and URL sources extracted from the email attachment + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-1 hash of the email attachment + Sample: + - acedb7898338a46f38d148d1d0456e644576d41b + - ea6fcc4c0c1f10d71742b29e98a977d995473dd1 + - 03d8fb85556edf397d8afcafc0b13f11ecbde50c + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashSha256s + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-256 hash of the email attachment + Sample: + - 0570dfd156ee00cb7bc2a94998157cb3a29292b9e9feed82d4b6c7d2c6bdd9d4 + - 2d96ebbbc5a5687b0f18fd5620e4e5489d49a877430146bbca447fabe9c47a6e + - 20d27422610967122439735cbcb48e4382a16e94a8b29c068e6b7d0e40466427 + DL_Type: dynamic + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpOriginalRecipients + ProductCode: + - sem + - xms + Description_EN: Original email recipients in the SMTP envelope + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpRecipients + ProductCode: + - sem + - xms + Description_EN: Email recipients in the SMTP envelope after scanning + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: groupId + ProductCode: + - sca + - sem + - xms + Description_EN: The group ID for the management scope filter + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanType + ProductCode: + - sca + - sem + - xms + Description_EN: Manual or real-time scan + Sample: + - realtime_mailmeta-exchange + - realtime_mailmeta-gmail + - gateway_mailmetadata + - gateway_realtime_accepted_mail_traffic + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFolder + ProductCode: + - sca + - xms + Description_EN: The email folder name + Sample: + - Inbox + - Bandeja de entrada + - Sent Items + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: msgUuidChain + ProductCode: + - sem + - xms + Description_EN: The internal UUID chain for each email in Trend Micro Feedback + Engine + Sample: + - 11111111-1111-1111-1111-111111111111;00000000-0000-0000-0000-000000000000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailMetaTraceId + ProductCode: + - sem + - xms + Description_EN: The trace ID generated by Trend Micro Feedback Engine + Sample: + - '' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mExternalUid + ProductCode: + - sca + - xms + Description_EN: The unique ID of the email + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTagHashRawSignature + ProductCode: + - sca + - sem + - xms + Description_EN: The raw signature hash of the email + Sample: + - PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjxtZXRhIG5hbWU9IGNvbnRlbnQ9ID48c3R5bGU+PCEtLS0tPjwvc3R5bGU+PC9oZWFkPjxib2R5IGxhbmc9IGxpbms9IHZsaW5rPSBzdHlsZT0gPjxkaXYgY2xhc3M9ID48cCBjbGFzcz0gPjxURVhUPjwvcD48L2Rpdj48L2JvZHk+PC9odG1sPg== + - PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjwvaGVhZD48Ym9keT48VEVYVD48L2JvZHk+PC9odG1sPg== + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailXMailer + ProductCode: + - sca + - sem + - xms + Description_EN: The X-Mailer header of the email + Sample: + - Microsoft Outlook 16.0 + - Microsoft CDO for Windows 2000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailUserAgent + ProductCode: + - sem + - sca + - xms + Description_EN: The user agent + Sample: + - Mutt/1.4.2.2i + - Heirloom mailx 12.5 7/5/10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFeatureId + ProductCode: + - sem + - sca + - xms + Description_EN: The email protocol detected by Trend Micro Anti-Spam Engine + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailRuleId + ProductCode: + - sca + - sem + - xms + Description_EN: The rule ID of the matched rule detected by Trend Micro + Anti-Spam Engine + Sample: + - '42003' + - '148036' + - '148140' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTagHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email tag hash detected by Trend Micro Anti-Spam Engine + Sample: + - 9ce01ebc63f408264876646e20905349 + - cf679dc99042b781106cbaccd4045ed3 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTextHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email text hash detected by Trend Micro Anti-Spam Engine + Sample: + - 221bab3766f6d2a2c6fcc37056511d53 + - f26f3a415103ea083ac49be6bb60f337 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailUrlHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email URL hash detected by Trend Micro Anti-Spam Engine + Sample: + - ca52197d96e4a00ce19eaf34b20c8937 + - ad50776a891bead6bf222e2b7be17724 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailHeaderHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email header hash detected by Trend Micro Anti-Spam Engine + Sample: + - 43f8bfc02d8f78f069c254bc17eba80b + - aa5d16ca145f91471e482d235843aac5 + - ad8776382ea4b7cffd0961c70223162e + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailScore + ProductCode: + - sem + - sca + - xms + Description_EN: The score assigned to the email by Trend Micro Anti-Spam + Engine + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWantedHeaderName + ProductCode: + - sca + - sem + - xms + Description_EN: The WantedHeader key name detected by Trend Micro Anti-Spam + Engine + Sample: + - CC + - X-TM-Product-Ver + - Received + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWantedHeaderValue + ProductCode: + - sca + - sem + - xms + Description_EN: The WantedHeader key value detected by Trend Micro Anti-Spam + Engine + Sample: + - cloud-app-security-5.0 + - BCL:0; + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailReplyToAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: The Reply To address detected by Trend Micro Anti-Spam Engine + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpFromAddresses + ProductCode: + - sem + - xms + Description_EN: The sender email address + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailThreatType + ProductCode: + - sca + - sem + - xms + Description_EN: The type of email detected by Trend Micro Anti-Spam Engine + Sample: + - suspected + - suspected, + - suspected, phishing + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWholeHeader + ProductCode: + - sca + - sem + - xms + Description_EN: The name and email address of the sender in the From header + detected by Trend Micro Anti-Spam Engine + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailHelo + ProductCode: + - sca + - sem + - xms + Description_EN: The HELO command detected by Trend Micro Anti-Spam Engine + Sample: + - HELO inpost.tmes.trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentTlsh + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH hash detected by Trend Micro Anti-Spam Engine + Sample: + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 7C31C9827A71A905CC6B0A73B10FE80C06F01E814AA396347F8B6F979690E9C3D75147 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSize + ProductCode: + - sem + - sca + - xms + Description_EN: The attachment file size + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSource + ProductCode: + - sca + - sem + - xms + Description_EN: The attachment source + Sample: + - TMASE + - PRODUCT + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpTls + ProductCode: + - sem + - xms + Description_EN: The SMTP TLS version number + Sample: + - TLS 1.2 + - TLS 1.3 + - noTLS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileTlshes + ProductCode: + - sem + - sca + - xms + Description_EN: The TLSH hash detected by Trend Micro Anti-Spam Engine + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailMetaText + ProductCode: + - sem + - xms + Description_EN: The postman meta text detected by Trend Micro Anti-Spam Engine + Sample: + - '' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailEurekaRuleIds + ProductCode: + - sem + - sca + - xms + Description_EN: The list of rule IDs scanned by Eureka and detected by Trend + Micro Anti-Spam Engine + Sample: + - '661030' + - '661230' + - '661267' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanTs + ProductCode: + - sca + - xms + - sem + Description_EN: The time the email was scanned + Sample: + - 1657135700000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailCacheId + ProductCode: + - sca + - xms + Description_EN: The internal email cache ID to identify emails in the same + group mails + Sample: + - + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailReturnPath + ProductCode: + - sca + - xms + Description_EN: The hidden email header that indicates where bounced messages + are sent + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: mailUrlsOriginalLink + ProductCode: + - sca + - sem + - xms + Description_EN: The original URL extracted from the email content + Sample: + - https://aka.ms/JoinTeamsMeeting + - http://go.microsoft.com/fwlink/p/?LinkID=12345 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sca + - sem + - xms + - xca + Description_EN: The event ID + Sample: + - 1 - MESSAGING_EMAIL_META + - 2 - MESSAGING_COLLABORATION_ACTIVITY + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true diff --git a/doc_v2/Email/Trend Micro Cloud App Security.yaml b/doc_v2/Email/Trend Micro Cloud App Security.yaml new file mode 100644 index 0000000..4c42a4f --- /dev/null +++ b/doc_v2/Email/Trend Micro Cloud App Security.yaml @@ -0,0 +1,1781 @@ +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: attachmentFileName + ProductCode: + - sca + - sem + - pdi + - xns + - xms + Description_EN: The file name of an attachment + Sample: + - Mail Body + - image001.png + - image002.png + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashSha1 + ProductCode: + - sca + - sem + Description_EN: The SHA-1 of the attached file (attachementFileName) + Sample: + - d63b1739a2fe56eb412dff1c69b76d4b9aad8ebd + - 3b923d078ea3bd39489ed6d334c423e4478a8ee3 + - 3a2e6a64e1b7f4c6cbebcb9e949dc66b667cdfbe + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashMd5 + ProductCode: + - sca + Description_EN: The MD5 of the attached file (attachementFileName) + Sample: + - RSjbNuJB0hx39ZpzwLdipg== + - +TmuTNLw3FMQlaTbPwjD8g== + - +XWktHxXXdY0O4A82FQMzQ== + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: objectType + ProductCode: + - sca + - sds + - sao + - sem + - xes + - sfs + Description_EN: The object type + Sample: + - file + - process + - qil + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: suser + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email sender + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: duser + ProductCode: + - sds + - pds + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email recipient + Sample: + - (no user) + - SYSTEM + - ' SYSTEM' + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: true +- Name: mailMsgSubject + ProductCode: + - sca + - pdi + - xns + - sem + - sao + - xms + Description_EN: The email subject + Sample: + - FW. mail subject + - ManageEngine + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: true +- Name: msgId + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The internet message ID + Sample: + - 66.6.00.0006 + - example.test.com + - dameware1svr + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubName + ProductCode: + - sao + - sca + - sds + - sem + - xes + - sig + - sss + Description_EN: The event type sub-name + Sample: + - IPS Detection + - Personal Firewall + - Attack Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subRuleName + ProductCode: + - sds + - pds + - sca + - sem + - xms + Description_EN: The subrule name + Sample: + - Pre-authentication failed. + - 'ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System + Logs,File Deletion ' + - 'ATTACK T1110: Multiple Windows Logon Failures' + - invisible_url_domain + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: actResult + ProductCode: + - sao + - sca + - sds + - pds + - pts + - ams + Description_EN: The result of an action + Sample: + - Dropped + - Successful + - Accepted + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: domainName + ProductCode: + - pdi + - xns + - sao + - sca + Description_EN: The detected domain name + Sample: + - http://10.10.10.10 + - example.domain.com + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: msgUuid + ProductCode: + - sca + - sem + - xms + Description_EN: The unique email ID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: orgId + ProductCode: + - sca + - xms + Description_EN: The organization ID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - pdi + - xns + - sws + - sao + - sig + - sca + - ams + - sds + Description_EN: The requested URL category + Sample: + - Untested + - '158' + - Web Advertisement + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyName + ProductCode: + - sao + - sca + - sws + - sem + - sig + - ptn + - scs + - mns + Description_EN: The name of the triggered policy + Sample: + - Steelcase + - Cabot + - Tigre - Medium Policy + - apiPostedPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: principalName + ProductCode: + - sws + - sig + - sca + - szn + Description_EN: The user principal name used to sign in to the proxy + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: engVer + ProductCode: + - xes + - sca + - sao + - sfs + Description_EN: The engine version + Sample: + - 1.0.0.1123_1.0.0.1101 + - 9.0.1004 + - 22.540.1001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: filterName + ProductCode: + - sca + - sem + - sao + - ptn + Description_EN: The filter name + Sample: + - ConnectionFilter + - Virtual Analyzer + - Data Loss Prevention + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailReceivedTime + ProductCode: + - sca + - sem + Description_EN: The mail received timestamp + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFolder + ProductCode: + - sca + Description_EN: The email folder name + Sample: + - CATEGORY_PROMOTIONS, UNREAD, INBOX + - UNREAD, CATEGORY_PERSONAL, INBOX + - UNREAD, CATEGORY_UPDATES, INBOX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: patVer + ProductCode: + - sao + - xes + - sca + Description_EN: The version of the behavior pattern + Sample: + - 35.1053.00 + - '630' + - 35.1071.00 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskConfidenceLevel + ProductCode: + - sao + - sca + Description_EN: The risk confidence level + Sample: + - '0' + - '1' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskLevel + ProductCode: + - sds + - sao + - sca + - xes + - pdi + - xns + Description_EN: The risk level + Sample: + - '1' + - high + - No Risk + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: ruleType + ProductCode: + - sds + - sao + - sca + - szn + Description_EN: The access rule type + Sample: + - udso + - point of entry + - unknown + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanTs + ProductCode: + - sca + - sem + - pdi + - xns + Description_EN: The mail scan time + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: score + ProductCode: + - pdi + - xns + - sao + - sca + - ams + - sds + Description_EN: The Web Reputation Services URL rating + Sample: + - 71 + - 81 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: threatName + ProductCode: + - sca + - sao + - pdi + - xns + Description_EN: The threat name + Sample: + - Malicious_CnC_access_on_UDP_blocked + - Malicious_CnC_access_on_TCP_blocked + - Other protected file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyTemplate + ProductCode: + - sao + - sca + - sig + Description_EN: The one-to-many data structure + Sample: + - policyName:Monitoreo All Files, template:Managed - All files + - policyName:HSS DLP, template:All File Extension + - 'India: Mobile Numbers' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleUuid + ProductCode: + - ptp + - stp + - sca + - szn + Description_EN: The signature UUID from the DV (Digital Vaccine) + Sample: + - 00000001-0001-0001-0001-000000007610 + - 00000001-0001-0001-0001-000000007120 + - 00000001-0001-0001-0001-000000017056 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgId + ProductCode: + - sca + Description_EN: The internet message ID of the email + Sample: + - + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailUniqueId + ProductCode: + - sca + Description_EN: The unique ID of the email + Sample: + - example_unique_id_1 + - example_unique_id_2 + - example_unique_id_3 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSubType + ProductCode: + - sca + - sem + Description_EN: The sub-types of the policy event (Displayed when a policy + event has sub-types) + Sample: + - Spam Others + - malware + - ContentFiltering + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailbox + ProductCode: + - sca + - sem + - ams + - xms + Description_EN: The mailbox that is protected by Trend Micro + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleVer + ProductCode: + - sca + - sds + - sem + - xms + Description_EN: The rule version + Sample: + - '202207060001' + - '202207190001' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstSeen + ProductCode: + - sca + - pts + - ddr + Description_EN: The first time the XDR log appeared + Sample: + - 1657195233000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: lastSeen + ProductCode: + - sca + - pts + - ddr + Description_EN: The last time the XDR log appeared + Sample: + - 1657195233000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachment + ProductCode: + - sca + - xms + Description_EN: The information about the email attachment + Sample: + - '{"attachmentFileTlsh": "", "attachmentFileName": "testfile.txt","attachmentFileHash": + "","attachmentFileSize": "-1"}' + DL_Type: dynamic + DL_Searchable: true +- Name: highlightedFileName + ProductCode: + - sca + - xms + Description_EN: The file names of suspicious attachments + Sample: + - detect_me.zip + - covid.zip + DL_Type: dynamic + DL_Searchable: true +- Name: attachmentFileHashs + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 hash value of the attachment file + Sample: + - 056a2975edffe7188c03c324ae4335f9380b57e3 + - 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 of the email attachment + Sample: + - 056a2975edffe7188c03c324ae4335f9380b57e3 + - 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a + DL_Type: dynamic + DL_Searchable: true +- Name: attachmentFileTlshs + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH hash value of the attachment file + Sample: + - '' + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileTlshes + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH of the email attachment + Sample: + - '' + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189 + DL_Type: dynamic + DL_Searchable: true +- Name: schemaVersion + ProductCode: + - sca + Description_EN: The schema version + Sample: + - '1.0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: reportGUID + ProductCode: + - sca + - sfs + - pdi + - xns + Description_EN: The GUID for Workbench to request report page data + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: indicatorCount + ProductCode: + - sca + Description_EN: The number of report indicators + Sample: + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: signInCountries + ProductCode: + - sca + - aad + Description_EN: The countries from which a user signed in + Sample: + - PH + - AU + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: highlightedFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 hashes of the highlighted file + Sample: + - C9877617DB6715792F9D5C959C1E8D4E56D0C281 + - 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722 + - 0E56D9540B07ED15EF745348D35C72A6A00A0BD9 + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgDirection + ProductCode: + - sca + - sem + - xms + Description_EN: The direction of the email message + Sample: + - 1 + DL_Type: int +- Name: cloudAppName + ProductCode: + - sca + Description_EN: The cloud app name + Sample: + - teams + - sharepoint + - exchange + - gmail + DL_Type: string + DL_Searchable: true +- Name: mailDirection + ProductCode: + - sca + - sem + - xms + Description_EN: Email traffic direction + Sample: + - 1 + - 3 + - 25 + DL_Type: int +- Name: respCode + ProductCode: + - sca + - sem + Description_EN: The network protocol response code + Sample: + - '302' + - '200' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: msgTOCUuid + ProductCode: + - sca + - sem + Description_EN: The email unique ID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rewrittenUrl + ProductCode: + - sca + - sem + Description_EN: The rewritten URL + Sample: + - https://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fexample.io%2 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventTime + ProductCode: + - sca + - sem + - xms + Description_EN: The time the agent detected the event + Sample: + - 1657135700000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sca + - sem + - xms + Description_EN: Internal product code (depricated) + Sample: + - '733' + - '742' + - TMEMS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: msgUuid + ProductCode: + - sca + - sem + - xms + Description_EN: Internal email UUID to identify each email message + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailbox + ProductCode: + - sca + - xms + Description_EN: Primary email address + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: mailDirection + ProductCode: + - sca + - sem + - xms + Description_EN: Email traffic direction + Sample: + - 1 + - 3 + - 25 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFromAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail from address in email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: mailToAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail To address in the email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgSubject + ProductCode: + - sca + - sem + - xms + Description_EN: Email subject + Sample: + - Your daily briefing + - 'Security alert for DeleteSecurityGroup on Account 549918006255 in Region: ap-southeast-1' + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgId + ProductCode: + - sca + - sem + - xms + Description_EN: Email ID + Sample: + - + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: true +- Name: mailCcAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail CC address in the email header + Sample: + - + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailBccAddresses + ProductCode: + - sem + - sca + - xms + Description_EN: Mail BCC address in the email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailSenderIp + ProductCode: + - sca + - sem + - xms + Description_EN: Email sender IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: mailAttachmentHash + ProductCode: + - sca + - sem + - xms + Description_EN: Hash value of the email attachment + Sample: + - 02ab50ee0bccadb43d6cc504928f2ff2 + - 0a0f335fb04f1acebb7500d5358321c0 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: mailUrlsRealLink + ProductCode: + - sca + - sem + - xms + Description_EN: URL extracted from the email content + Sample: + - https://aka.ms/JoinTeamsMeeting + - http://go.microsoft.com/fwlink/p/?LinkID=12345 + DL_Type: dynamic + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: mailSourceDomain + ProductCode: + - sca + - xms + Description_EN: Email domain of the sender + Sample: + - example.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: mailUrlsVisibleLink + ProductCode: + - sca + - sem + - xms + Description_EN: URL extracted from the email content + Sample: + - Unsubscribe + - Android + DL_Type: dynamic + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: orgId + ProductCode: + - sca + - xms + Description_EN: The organization ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileName + ProductCode: + - sca + - sem + - xms + Description_EN: File name of the email attachment + Sample: + - image001.png + - image002.png + - image003.png + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSha1 + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-1 hash of the email attachment + Sample: + - 03d8fb85556edf397d8afcafc0b13f11ecbde50c + - 056a2975edffe7188c03c324ae4335f9380b57e3 + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentMd5 + ProductCode: + - sca + - sem + - xms + Description_EN: MD5 hash of the email attachment + Sample: + - 003fa299ab119219596f952c68029810 + - 03aeabf6a745cb627ee29c05a22e58cb + DL_Type: dynamic + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSha256 + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-256 hash of the email attachment + Sample: + - 29d72af5608ee5eade7c4346d3c32dfcc6b54f8fb43d977ff0306ad68b255a01 + - cb0628092ddea96bb040221b5c793dbbb792a67d0621bdfba170c07374d85801 + DL_Type: dynamic + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-1 hash of the email attachment + Sample: + - acedb7898338a46f38d148d1d0456e644576d41b + - ea6fcc4c0c1f10d71742b29e98a977d995473dd1 + - 03d8fb85556edf397d8afcafc0b13f11ecbde50c + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashSha256s + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-256 hash of the email attachment + Sample: + - 0570dfd156ee00cb7bc2a94998157cb3a29292b9e9feed82d4b6c7d2c6bdd9d4 + - 2d96ebbbc5a5687b0f18fd5620e4e5489d49a877430146bbca447fabe9c47a6e + - 20d27422610967122439735cbcb48e4382a16e94a8b29c068e6b7d0e40466427 + DL_Type: dynamic + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: groupId + ProductCode: + - sca + - sem + - xms + Description_EN: The group ID for the management scope filter + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanType + ProductCode: + - sca + - sem + - xms + Description_EN: Manual or real-time scan + Sample: + - realtime_mailmeta-exchange + - realtime_mailmeta-gmail + - gateway_mailmetadata + - gateway_realtime_accepted_mail_traffic + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFolder + ProductCode: + - sca + - xms + Description_EN: The email folder name + Sample: + - Inbox + - Bandeja de entrada + - Sent Items + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mExternalUid + ProductCode: + - sca + - xms + Description_EN: The unique ID of the email + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTagHashRawSignature + ProductCode: + - sca + - sem + - xms + Description_EN: The raw signature hash of the email + Sample: + - PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjxtZXRhIG5hbWU9IGNvbnRlbnQ9ID48c3R5bGU+PCEtLS0tPjwvc3R5bGU+PC9oZWFkPjxib2R5IGxhbmc9IGxpbms9IHZsaW5rPSBzdHlsZT0gPjxkaXYgY2xhc3M9ID48cCBjbGFzcz0gPjxURVhUPjwvcD48L2Rpdj48L2JvZHk+PC9odG1sPg== + - PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjwvaGVhZD48Ym9keT48VEVYVD48L2JvZHk+PC9odG1sPg== + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailXMailer + ProductCode: + - sca + - sem + - xms + Description_EN: The X-Mailer header of the email + Sample: + - Microsoft Outlook 16.0 + - Microsoft CDO for Windows 2000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailUserAgent + ProductCode: + - sem + - sca + - xms + Description_EN: The user agent + Sample: + - Mutt/1.4.2.2i + - Heirloom mailx 12.5 7/5/10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFeatureId + ProductCode: + - sem + - sca + - xms + Description_EN: The email protocol detected by Trend Micro Anti-Spam Engine + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailRuleId + ProductCode: + - sca + - sem + - xms + Description_EN: The rule ID of the matched rule detected by Trend Micro + Anti-Spam Engine + Sample: + - '42003' + - '148036' + - '148140' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTagHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email tag hash detected by Trend Micro Anti-Spam Engine + Sample: + - 9ce01ebc63f408264876646e20905349 + - cf679dc99042b781106cbaccd4045ed3 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTextHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email text hash detected by Trend Micro Anti-Spam Engine + Sample: + - 221bab3766f6d2a2c6fcc37056511d53 + - f26f3a415103ea083ac49be6bb60f337 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailUrlHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email URL hash detected by Trend Micro Anti-Spam Engine + Sample: + - ca52197d96e4a00ce19eaf34b20c8937 + - ad50776a891bead6bf222e2b7be17724 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailHeaderHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email header hash detected by Trend Micro Anti-Spam Engine + Sample: + - 43f8bfc02d8f78f069c254bc17eba80b + - aa5d16ca145f91471e482d235843aac5 + - ad8776382ea4b7cffd0961c70223162e + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailScore + ProductCode: + - sem + - sca + - xms + Description_EN: The score assigned to the email by Trend Micro Anti-Spam + Engine + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWantedHeaderName + ProductCode: + - sca + - sem + - xms + Description_EN: The WantedHeader key name detected by Trend Micro Anti-Spam + Engine + Sample: + - CC + - X-TM-Product-Ver + - Received + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWantedHeaderValue + ProductCode: + - sca + - sem + - xms + Description_EN: The WantedHeader key value detected by Trend Micro Anti-Spam + Engine + Sample: + - cloud-app-security-5.0 + - BCL:0; + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailReplyToAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: The Reply To address detected by Trend Micro Anti-Spam Engine + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailThreatType + ProductCode: + - sca + - sem + - xms + Description_EN: The type of email detected by Trend Micro Anti-Spam Engine + Sample: + - suspected + - suspected, + - suspected, phishing + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWholeHeader + ProductCode: + - sca + - sem + - xms + Description_EN: The name and email address of the sender in the From header + detected by Trend Micro Anti-Spam Engine + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailHelo + ProductCode: + - sca + - sem + - xms + Description_EN: The HELO command detected by Trend Micro Anti-Spam Engine + Sample: + - HELO inpost.tmes.trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentTlsh + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH hash detected by Trend Micro Anti-Spam Engine + Sample: + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 7C31C9827A71A905CC6B0A73B10FE80C06F01E814AA396347F8B6F979690E9C3D75147 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSize + ProductCode: + - sem + - sca + - xms + Description_EN: The attachment file size + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSource + ProductCode: + - sca + - sem + - xms + Description_EN: The attachment source + Sample: + - TMASE + - PRODUCT + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileTlshes + ProductCode: + - sem + - sca + - xms + Description_EN: The TLSH hash detected by Trend Micro Anti-Spam Engine + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailEurekaRuleIds + ProductCode: + - sem + - sca + - xms + Description_EN: The list of rule IDs scanned by Eureka and detected by Trend + Micro Anti-Spam Engine + Sample: + - '661030' + - '661230' + - '661267' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanTs + ProductCode: + - sca + - xms + - sem + Description_EN: The time the email was scanned + Sample: + - 1657135700000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailCacheId + ProductCode: + - sca + - xms + Description_EN: The internal email cache ID to identify emails in the same + group mails + Sample: + - + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailReturnPath + ProductCode: + - sca + - xms + Description_EN: The hidden email header that indicates where bounced messages + are sent + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: mailUrlsOriginalLink + ProductCode: + - sca + - sem + - xms + Description_EN: The original URL extracted from the email content + Sample: + - https://aka.ms/JoinTeamsMeeting + - http://go.microsoft.com/fwlink/p/?LinkID=12345 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sca + - sem + - xms + - xca + Description_EN: The event ID + Sample: + - 1 - MESSAGING_EMAIL_META + - 2 - MESSAGING_COLLABORATION_ACTIVITY + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true diff --git a/doc_v2/Email/Trend Micro Email Security.yaml b/doc_v2/Email/Trend Micro Email Security.yaml new file mode 100644 index 0000000..9aa7519 --- /dev/null +++ b/doc_v2/Email/Trend Micro Email Security.yaml @@ -0,0 +1,1540 @@ +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: attachmentFileName + ProductCode: + - sca + - sem + - pdi + - xns + - xms + Description_EN: The file name of an attachment + Sample: + - Mail Body + - image001.png + - image002.png + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashSha1 + ProductCode: + - sca + - sem + Description_EN: The SHA-1 of the attached file (attachementFileName) + Sample: + - d63b1739a2fe56eb412dff1c69b76d4b9aad8ebd + - 3b923d078ea3bd39489ed6d334c423e4478a8ee3 + - 3a2e6a64e1b7f4c6cbebcb9e949dc66b667cdfbe + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashSha256 + ProductCode: + - pdi + - xns + - sem + Description_EN: The SHA-256 of the attached file (attachementFileName) + Sample: + - D81D4C14DDEB8CA390FFADA69265AAD46CDEDD72CDD332CB8AA17D924626B397 + - 01DE1FC697D2D0850F0468474A3E1E0BF4D78B23F0633908CF82E504E0DCBFF9 + - 02D16D9970AB635A7B05C3A268E23F5B41C419DD022F1054E9FD912BE130BDB0 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectType + ProductCode: + - sca + - sds + - sao + - sem + - xes + - sfs + Description_EN: The object type + Sample: + - file + - process + - qil + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: suser + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email sender + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: duser + ProductCode: + - sds + - pds + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email recipient + Sample: + - (no user) + - SYSTEM + - ' SYSTEM' + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: true +- Name: mailMsgSubject + ProductCode: + - sca + - pdi + - xns + - sem + - sao + - xms + Description_EN: The email subject + Sample: + - FW. mail subject + - ManageEngine + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: true +- Name: msgId + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The internet message ID + Sample: + - 66.6.00.0006 + - example.test.com + - dameware1svr + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubName + ProductCode: + - sao + - sca + - sds + - sem + - xes + - sig + - sss + Description_EN: The event type sub-name + Sample: + - IPS Detection + - Personal Firewall + - Attack Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subRuleName + ProductCode: + - sds + - pds + - sca + - sem + - xms + Description_EN: The subrule name + Sample: + - Pre-authentication failed. + - 'ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System + Logs,File Deletion ' + - 'ATTACK T1110: Multiple Windows Logon Failures' + - invisible_url_domain + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: msgUuid + ProductCode: + - sca + - sem + - xms + Description_EN: The unique email ID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyName + ProductCode: + - sao + - sca + - sws + - sem + - sig + - ptn + - scs + - mns + Description_EN: The name of the triggered policy + Sample: + - Steelcase + - Cabot + - Tigre - Medium Policy + - apiPostedPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: filterName + ProductCode: + - sca + - sem + - sao + - ptn + Description_EN: The filter name + Sample: + - ConnectionFilter + - Virtual Analyzer + - Data Loss Prevention + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailReceivedTime + ProductCode: + - sca + - sem + Description_EN: The mail received timestamp + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: scanTs + ProductCode: + - sca + - sem + - pdi + - xns + Description_EN: The mail scan time + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: senderIp + ProductCode: + - pdi + - xns + - sao + - sem + Description_EN: The sender IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSubType + ProductCode: + - sca + - sem + Description_EN: The sub-types of the policy event (Displayed when a policy + event has sub-types) + Sample: + - Spam Others + - malware + - ContentFiltering + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailbox + ProductCode: + - sca + - sem + - ams + - xms + Description_EN: The mailbox that is protected by Trend Micro + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpHelo + ProductCode: + - sem + Description_EN: The domain name of the email server by using the SMTP HELO + command + Sample: + - example.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpFromAddresses + ProductCode: + - sem + Description_EN: The envelope address of the sender + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpOriginalRecipients + ProductCode: + - sem + Description_EN: The envelope addresses of the original recipients + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpRecipients + ProductCode: + - sem + Description_EN: The envelope addresses of the current recipients + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpTls + ProductCode: + - sem + Description_EN: The SMTP TLS version, for example, TLS 1.2 + Sample: + - noTLS + - TLS 1.2 + - TLS 1.3 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: msgUuidChain + ProductCode: + - sem + Description_EN: The message UUID chain + Sample: + - 00027ac3-f8f2-cc8f-d078-3a57f12f3d55;00027ac3-f8f2-cc8f-d078-3a57f12f3d55 + - 0005ab64-3992-644c-3592-503c3610cec9;0005ab64-3992-644c-3592-503c3610cec9 + - 00062621-fec4-9e4d-7609-25b2b3189214;00062621-fec4-9e4d-7609-25b2b3189214 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: correlatedIntelligence + ProductCode: + - sem + - xms + Description_EN: The Correlated Intelligence detection + Sample: '{"risk_type": "Anomaly","matched_rules": [{"threat_type": "Possibly Unwanted + Email","matched_filters": [{"id":"FIL013", "name": "Marketing Email Traits"},{"id":"FIL098", + "name": "Infrequent Sender Email Domain"}],"name": "Possibly Unwanted Marketing + Email","id": "AN004"}]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionDetail + ProductCode: + - sem + Description_EN: The details about each event type + Sample: + - '{}' + - '{"detail":"4.7.1 \u003csample_email@trendmicro.com\u003e: Recipient address rejected: + Ratelimit-2"}' + - '{"detail":"4.7.1 \u003csample_email@trendmicro.com.br\u003e: Recipient address + rejected: Ratelimit-2"}' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: highlightMailMsgSubject + ProductCode: + - sem + Description_EN: The email subject + Sample: + - Delivery Status + - Undelivered Mail Returned to Sender + - Successful Mail Delivery Report + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleVer + ProductCode: + - sca + - sds + - sem + - xms + Description_EN: The rule version + Sample: + - '202207060001' + - '202207190001' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashs + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 hash value of the attachment file + Sample: + - 056a2975edffe7188c03c324ae4335f9380b57e3 + - 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 of the email attachment + Sample: + - 056a2975edffe7188c03c324ae4335f9380b57e3 + - 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a + DL_Type: dynamic + DL_Searchable: true +- Name: attachmentFileTlshs + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH hash value of the attachment file + Sample: + - '' + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileTlshes + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH of the email attachment + Sample: + - '' + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189 + DL_Type: dynamic + DL_Searchable: true +- Name: highlightedFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: The SHA-1 hashes of the highlighted file + Sample: + - C9877617DB6715792F9D5C959C1E8D4E56D0C281 + - 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722 + - 0E56D9540B07ED15EF745348D35C72A6A00A0BD9 + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgDirection + ProductCode: + - sca + - sem + - xms + Description_EN: The direction of the email message + Sample: + - 1 + DL_Type: int +- Name: mailDirection + ProductCode: + - sca + - sem + - xms + Description_EN: Email traffic direction + Sample: + - 1 + - 3 + - 25 + DL_Type: int +- Name: respCode + ProductCode: + - sca + - sem + Description_EN: The network protocol response code + Sample: + - '302' + - '200' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: msgTOCUuid + ProductCode: + - sca + - sem + Description_EN: The email unique ID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rewrittenUrl + ProductCode: + - sca + - sem + Description_EN: The rewritten URL + Sample: + - https://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fexample.io%2 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventTime + ProductCode: + - sca + - sem + - xms + Description_EN: The time the agent detected the event + Sample: + - 1657135700000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sca + - sem + - xms + Description_EN: Internal product code (depricated) + Sample: + - '733' + - '742' + - TMEMS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: msgUuid + ProductCode: + - sca + - sem + - xms + Description_EN: Internal email UUID to identify each email message + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailDirection + ProductCode: + - sca + - sem + - xms + Description_EN: Email traffic direction + Sample: + - 1 + - 3 + - 25 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFromAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail from address in email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: mailToAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail To address in the email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgSubject + ProductCode: + - sca + - sem + - xms + Description_EN: Email subject + Sample: + - Your daily briefing + - 'Security alert for DeleteSecurityGroup on Account 549918006255 in Region: ap-southeast-1' + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgId + ProductCode: + - sca + - sem + - xms + Description_EN: Email ID + Sample: + - + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: true +- Name: mailCcAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: Mail CC address in the email header + Sample: + - + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailBccAddresses + ProductCode: + - sem + - sca + - xms + Description_EN: Mail BCC address in the email header + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: mailSenderIp + ProductCode: + - sca + - sem + - xms + Description_EN: Email sender IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: mailAttachmentHash + ProductCode: + - sca + - sem + - xms + Description_EN: Hash value of the email attachment + Sample: + - 02ab50ee0bccadb43d6cc504928f2ff2 + - 0a0f335fb04f1acebb7500d5358321c0 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: mailUrlsRealLink + ProductCode: + - sca + - sem + - xms + Description_EN: URL extracted from the email content + Sample: + - https://aka.ms/JoinTeamsMeeting + - http://go.microsoft.com/fwlink/p/?LinkID=12345 + DL_Type: dynamic + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: mailUrlsVisibleLink + ProductCode: + - sca + - sem + - xms + Description_EN: URL extracted from the email content + Sample: + - Unsubscribe + - Android + DL_Type: dynamic + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileName + ProductCode: + - sca + - sem + - xms + Description_EN: File name of the email attachment + Sample: + - image001.png + - image002.png + - image003.png + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSha1 + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-1 hash of the email attachment + Sample: + - 03d8fb85556edf397d8afcafc0b13f11ecbde50c + - 056a2975edffe7188c03c324ae4335f9380b57e3 + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentMd5 + ProductCode: + - sca + - sem + - xms + Description_EN: MD5 hash of the email attachment + Sample: + - 003fa299ab119219596f952c68029810 + - 03aeabf6a745cb627ee29c05a22e58cb + DL_Type: dynamic + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSha256 + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-256 hash of the email attachment + Sample: + - 29d72af5608ee5eade7c4346d3c32dfcc6b54f8fb43d977ff0306ad68b255a01 + - cb0628092ddea96bb040221b5c793dbbb792a67d0621bdfba170c07374d85801 + DL_Type: dynamic + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentUrls + ProductCode: + - sem + - xms + Description_EN: The URLs and URL sources extracted from the email attachment + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashes + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-1 hash of the email attachment + Sample: + - acedb7898338a46f38d148d1d0456e644576d41b + - ea6fcc4c0c1f10d71742b29e98a977d995473dd1 + - 03d8fb85556edf397d8afcafc0b13f11ecbde50c + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashSha256s + ProductCode: + - sca + - sem + - xms + Description_EN: SHA-256 hash of the email attachment + Sample: + - 0570dfd156ee00cb7bc2a94998157cb3a29292b9e9feed82d4b6c7d2c6bdd9d4 + - 2d96ebbbc5a5687b0f18fd5620e4e5489d49a877430146bbca447fabe9c47a6e + - 20d27422610967122439735cbcb48e4382a16e94a8b29c068e6b7d0e40466427 + DL_Type: dynamic + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpOriginalRecipients + ProductCode: + - sem + - xms + Description_EN: Original email recipients in the SMTP envelope + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpRecipients + ProductCode: + - sem + - xms + Description_EN: Email recipients in the SMTP envelope after scanning + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: groupId + ProductCode: + - sca + - sem + - xms + Description_EN: The group ID for the management scope filter + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanType + ProductCode: + - sca + - sem + - xms + Description_EN: Manual or real-time scan + Sample: + - realtime_mailmeta-exchange + - realtime_mailmeta-gmail + - gateway_mailmetadata + - gateway_realtime_accepted_mail_traffic + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: msgUuidChain + ProductCode: + - sem + - xms + Description_EN: The internal UUID chain for each email in Trend Micro Feedback + Engine + Sample: + - 11111111-1111-1111-1111-111111111111;00000000-0000-0000-0000-000000000000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailMetaTraceId + ProductCode: + - sem + - xms + Description_EN: The trace ID generated by Trend Micro Feedback Engine + Sample: + - '' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTagHashRawSignature + ProductCode: + - sca + - sem + - xms + Description_EN: The raw signature hash of the email + Sample: + - PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjxtZXRhIG5hbWU9IGNvbnRlbnQ9ID48c3R5bGU+PCEtLS0tPjwvc3R5bGU+PC9oZWFkPjxib2R5IGxhbmc9IGxpbms9IHZsaW5rPSBzdHlsZT0gPjxkaXYgY2xhc3M9ID48cCBjbGFzcz0gPjxURVhUPjwvcD48L2Rpdj48L2JvZHk+PC9odG1sPg== + - PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjwvaGVhZD48Ym9keT48VEVYVD48L2JvZHk+PC9odG1sPg== + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailXMailer + ProductCode: + - sca + - sem + - xms + Description_EN: The X-Mailer header of the email + Sample: + - Microsoft Outlook 16.0 + - Microsoft CDO for Windows 2000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailUserAgent + ProductCode: + - sem + - sca + - xms + Description_EN: The user agent + Sample: + - Mutt/1.4.2.2i + - Heirloom mailx 12.5 7/5/10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailFeatureId + ProductCode: + - sem + - sca + - xms + Description_EN: The email protocol detected by Trend Micro Anti-Spam Engine + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailRuleId + ProductCode: + - sca + - sem + - xms + Description_EN: The rule ID of the matched rule detected by Trend Micro + Anti-Spam Engine + Sample: + - '42003' + - '148036' + - '148140' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTagHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email tag hash detected by Trend Micro Anti-Spam Engine + Sample: + - 9ce01ebc63f408264876646e20905349 + - cf679dc99042b781106cbaccd4045ed3 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailTextHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email text hash detected by Trend Micro Anti-Spam Engine + Sample: + - 221bab3766f6d2a2c6fcc37056511d53 + - f26f3a415103ea083ac49be6bb60f337 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailUrlHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email URL hash detected by Trend Micro Anti-Spam Engine + Sample: + - ca52197d96e4a00ce19eaf34b20c8937 + - ad50776a891bead6bf222e2b7be17724 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailHeaderHash + ProductCode: + - sca + - sem + - xms + Description_EN: The email header hash detected by Trend Micro Anti-Spam Engine + Sample: + - 43f8bfc02d8f78f069c254bc17eba80b + - aa5d16ca145f91471e482d235843aac5 + - ad8776382ea4b7cffd0961c70223162e + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailScore + ProductCode: + - sem + - sca + - xms + Description_EN: The score assigned to the email by Trend Micro Anti-Spam + Engine + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWantedHeaderName + ProductCode: + - sca + - sem + - xms + Description_EN: The WantedHeader key name detected by Trend Micro Anti-Spam + Engine + Sample: + - CC + - X-TM-Product-Ver + - Received + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWantedHeaderValue + ProductCode: + - sca + - sem + - xms + Description_EN: The WantedHeader key value detected by Trend Micro Anti-Spam + Engine + Sample: + - cloud-app-security-5.0 + - BCL:0; + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailReplyToAddresses + ProductCode: + - sca + - sem + - xms + Description_EN: The Reply To address detected by Trend Micro Anti-Spam Engine + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpFromAddresses + ProductCode: + - sem + - xms + Description_EN: The sender email address + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailThreatType + ProductCode: + - sca + - sem + - xms + Description_EN: The type of email detected by Trend Micro Anti-Spam Engine + Sample: + - suspected + - suspected, + - suspected, phishing + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailWholeHeader + ProductCode: + - sca + - sem + - xms + Description_EN: The name and email address of the sender in the From header + detected by Trend Micro Anti-Spam Engine + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailHelo + ProductCode: + - sca + - sem + - xms + Description_EN: The HELO command detected by Trend Micro Anti-Spam Engine + Sample: + - HELO inpost.tmes.trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentTlsh + ProductCode: + - sca + - sem + - xms + Description_EN: The TLSH hash detected by Trend Micro Anti-Spam Engine + Sample: + - 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39 + - 7C31C9827A71A905CC6B0A73B10FE80C06F01E814AA396347F8B6F979690E9C3D75147 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSize + ProductCode: + - sem + - sca + - xms + Description_EN: The attachment file size + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentSource + ProductCode: + - sca + - sem + - xms + Description_EN: The attachment source + Sample: + - TMASE + - PRODUCT + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailSmtpTls + ProductCode: + - sem + - xms + Description_EN: The SMTP TLS version number + Sample: + - TLS 1.2 + - TLS 1.3 + - noTLS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileTlshes + ProductCode: + - sem + - sca + - xms + Description_EN: The TLSH hash detected by Trend Micro Anti-Spam Engine + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailMetaText + ProductCode: + - sem + - xms + Description_EN: The postman meta text detected by Trend Micro Anti-Spam Engine + Sample: + - '' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailEurekaRuleIds + ProductCode: + - sem + - sca + - xms + Description_EN: The list of rule IDs scanned by Eureka and detected by Trend + Micro Anti-Spam Engine + Sample: + - '661030' + - '661230' + - '661267' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanTs + ProductCode: + - sca + - xms + - sem + Description_EN: The time the email was scanned + Sample: + - 1657135700000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailUrlsOriginalLink + ProductCode: + - sca + - sem + - xms + Description_EN: The original URL extracted from the email content + Sample: + - https://aka.ms/JoinTeamsMeeting + - http://go.microsoft.com/fwlink/p/?LinkID=12345 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sca + - sem + - xms + - xca + Description_EN: The event ID + Sample: + - 1 - MESSAGING_EMAIL_META + - 2 - MESSAGING_COLLABORATION_ACTIVITY + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true diff --git a/doc_v2/Endpoint/Data Detection and Response.yaml b/doc_v2/Endpoint/Data Detection and Response.yaml new file mode 100644 index 0000000..878e358 --- /dev/null +++ b/doc_v2/Endpoint/Data Detection and Response.yaml @@ -0,0 +1,571 @@ +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: endpointIp + ProductCode: + - sds + - pds + - sao + - ptp + - stp + - ptn + - sss + - ddr + Description_EN: The IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: osName + ProductCode: + - sig + - ams + - szn + - ddr + - sss + Description_EN: The host OS name + Sample: + - Linux + - windows 10.0.22000 + - windows 10.0.19044 + - windows 10.0.19043 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstSeen + ProductCode: + - sca + - pts + - ddr + Description_EN: The first time the XDR log appeared + Sample: + - 1657195233000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: lastSeen + ProductCode: + - sca + - pts + - ddr + Description_EN: The last time the XDR log appeared + Sample: + - 1657195233000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osVer + ProductCode: + - ams + - szn + - ddr + Description_EN: The OS version + Sample: + - '11' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logonUsers + ProductCode: + - ALL + - ddr + Description_EN: The telemetry events that match the Security Analytics Engine + filter, and logonUsers stores the logonUsers value of the original events + Sample: + - BHBShortJ + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: duration + ProductCode: + - ddr + Description_EN: The detection interval (in milliseconds) + Sample: + - 300000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregateUnit + ProductCode: + - ddr + Description_EN: The metric unit + Sample: + - file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregateFunction + ProductCode: + - ddr + Description_EN: The metric aggregator + Sample: + - 0 - sum + - 1 - avg + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: uuids + ProductCode: + - ddr + Description_EN: The UUIDs of detection records + Sample: + - [00000000-0000-0000-0000-000000000000] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: lineageId + ProductCode: + - ddr + Description_EN: The lineage ID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: matchedPolicies + ProductCode: + - ddr + Description_EN: The matched policies of detection records + Sample: + - [00000000-0000-0000-0000-000000000000] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionFileList + ProductCode: + - ddr + Description_EN: The information about the related files + Sample: + - '{"fileName": "sample.txt", "edgeId": "00000000-0000-0000-0000-000000000000"}' + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: objectUser + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The owner name of the target process or the login user name + Sample: + - root + - SYSTEM + - oracle + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The destination port number + Sample: [] + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The destination IP address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The source port number + Sample: + - 53 + - 5353 + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The source address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: objectFileSize + ProductCode: + - xes + - sao + - sds + - ddr + Description_EN: The file size of the object file + Sample: + - 0 + - 59456 + - 60 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileSize + ProductCode: + - xes + - sao + - sds + - ddr + Description_EN: The file size of the source file + Sample: + - '0' + - '131072' + - '196608' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleIdStr + ProductCode: + - ddr + Description_EN: The rule ID + Sample: + - 0000000-0000-0000-0000-000000000000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUri + ProductCode: + - ddr + Description_EN: Path of target file + Sample: + - C://path/of/file.txt + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHash + ProductCode: + - ddr + Description_EN: The cryptographic hash of the target process image or file, + with the specific hash algorithm to be determined + Sample: + - 1ca71017d2fa4775253670e1e55e26912bfdc156 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectServiceType + ProductCode: + - ddr + Description_EN: Type of target file + Sample: + - local + - smb + - web + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcUri + ProductCode: + - ddr + Description_EN: Path of source file + Sample: + - C://path/of/file.txt + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHash + ProductCode: + - ddr + Description_EN: The cryptographic hash of the source process image or file, + with the specific hash algorithm to be determined. + Sample: + - 1ca71017d2fa4775253670e1e55e26912bfdc156 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcServiceType + ProductCode: + - ddr + Description_EN: Type of source file + Sample: + - local + - smb + - web + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcUser + ProductCode: + - ddr + Description_EN: The owner name of the source process or the login user name + Sample: + - root + - SYSTEM + - oracle + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyIds + ProductCode: + - ddr + Description_EN: The Ids of DDR’s data policy + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: metaSrcExtra + ProductCode: + - ddr + Description_EN: The meta for identifying the source of events + Sample: + - "[{'metaSrcUri': ...]" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Endpoint/Endpoint Sensor.yaml b/doc_v2/Endpoint/Endpoint Sensor.yaml new file mode 100644 index 0000000..f5a51cf --- /dev/null +++ b/doc_v2/Endpoint/Endpoint Sensor.yaml @@ -0,0 +1,5041 @@ +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: objectFilePath + ProductCode: + - sao + - sds + - xes + - scs + Description_EN: The file path of the target process image or target file + Sample: + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - zwwritevirtualmemory + - c:\windows\system32\wbem\wmiprvse.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha1 + ProductCode: + - sao + - xes + - sds + Description_EN: The SHA-1 of the objectFilePath object + Sample: + - 51B8646308EE0B68AD1F7F1291B85395434DE49A + - 36C5D12033B2EAF251BAE61C00690FFB17FDDC87 + - 2586528000199793730B05D3F169BCF139E4D7A1 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha256 + ProductCode: + - sao + - xes + - sds + Description_EN: The SHA-256 of the object (objectFilePath) + Sample: + - A75C85F3B089993E9C042FB82ECB7757E8F460ED8065FC7991CAA38A6DE0F50C + - 908B64B1971A979C7E3E8CE4621945CBA84854CB98D76367B791A6E22B5F6D53 + - 1A2ABAAD8A166B66CA35AB51C7432C5A7E46996472C8174281842896408D7F96 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashMd5 + ProductCode: + - sao + - xes + - sds + Description_EN: The MD5 of the object + Sample: + - 801E8003C257C8F540B20F1E0DECD3A6 + - CDA48FC75952AD12D99E526D0B6BF70A + - D5120786925038601A77C2E1EB9A3A0A + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: processCmd + ProductCode: + - sds + - xes + - pds + - sao + - scs + Description_EN: The subject process command line + Sample: + - '"C:\Program Files (x86)\AADM\AADM.exe" ' + - /usr/lib/inet/sendmail -bl -q15m + - ComDir + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectCmd + ProductCode: + - sao + - sds + - xes + Description_EN: The object process command line + Sample: + - C:\WINDOWS\system32\wbem\wmiprvse.exe -Embedding + - "\"C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe\" -NoLogo -Noninteractive + -NoProfile -ExecutionPolicy Bypass \"& 'C:\\WINDOWS\\CCM\\SystemTemp\\afd6f0e5-e491-4764-a20a-9f1d9edf3cce.ps1'\"" + - C:\WINDOWS\system32\lsass.exe + DL_Type: dynamic + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryData + ProductCode: + - xes + - sao + - sds + Description_EN: The registry data contents + Sample: + - C:\Program Files\AlertMedia\AlertMedia Desktop Notifications\AlertMedia.exe + DL_Type: string + DL_CommonKey: + - RegistryValueData + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryKeyHandle + ProductCode: + - xes + - sds + - sao + Description_EN: The registry key path + Sample: + - HKCR\CID\{00000000-0000-0000-0000-000000000001} + - HKLM\SOFTWARE\WOW6432Node\Eos + - HKCU\SOFTWARE\Cerner\InstantAccess + DL_Type: string + DL_CommonKey: + - RegistryKey + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryValue + ProductCode: + - xes + - sao + - sds + Description_EN: The registry value name + Sample: + - '1' + - key + - reg + DL_Type: string + DL_CommonKey: + - RegistryValue + DL_Searchable: true + DL_Aggregable: false +- Name: objectType + ProductCode: + - sca + - sds + - sao + - sem + - xes + - sfs + Description_EN: The object type + Sample: + - file + - process + - qil + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFilePath + ProductCode: + - sao + - sds + - xes + Description_EN: The file path of the subject process + Sample: + - c:\windows\system32\svchost.exe + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - c:\windows\syswow64\srts\wmipr.exe + DL_Type: string + DL_CommonKey: + - ProcessFullPath + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: tacticId + ProductCode: + - pdi + - xns + - xes + - sao + Description_EN: The list of MITRE tactic IDs + Sample: + - TA0011 + - TA0008 + - TA0001 + DL_Type: dynamic + DL_CommonKey: + - Tactic + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubName + ProductCode: + - sao + - sca + - sds + - sem + - xes + - sig + - sss + Description_EN: The event type sub-name + Sample: + - IPS Detection + - Personal Firewall + - Attack Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentCmd + ProductCode: + - xes + - scs + Description_EN: The command line of the subject parent process + Sample: + - '"C:\Tiburon\CommandCAD\Test\Startup.exe" ' + - C:\WINDOWS\Explorer.EXE + - C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s Appinfo + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: parentFilePath + ProductCode: + - xes + Description_EN: The full file path of the parent process + Sample: + - c:\windows\explorer.exe + - c:\tiburon\commandcad\test\startup.exe + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha1 + ProductCode: + - xes + Description_EN: The SHA-1 of the subject parent process + Sample: + - 9CF40F19A625F7033689D04F4C8E1CC6A8FA4F5B + - 799AB02945EDB9A37A42A3F742DE73165F4A9665 + - 1F912D4BEC338EF10B7C9F19976286F8ACC4EB97 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha256 + ProductCode: + - xes + - pts + Description_EN: The SHA-256 of the subject parent process + Sample: + - 14A1223722D486ABBC88682AB49AF8E56DC65AC4E153027985BFFFF7C815C0EC + - 2EF51284CA9211ADEC3E8E095F386FEC742E0532075894AE99024C65949F935E + - F3FEB95E7BCFB0766A694D93FCA29EDA7E2CA977C2395B4BE75242814EB6D881 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashMd5 + ProductCode: + - xes + Description_EN: The MD5 of the subject parent process + Sample: + - 7B9E6D992AA86F0D2ECDF8F65A6BB792 + - 2B47C89252BB932B292122E54C3DAF25 + - CD10CB894BE2128FCA0BF0E2B0C27C16 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA-1 of the subject process + Sample: + - C0885381EBAC94AB20E78936434FA208F6B65352 + - ac373ed32b491da22924e2e11e36574e5d582a35 + - DF93F7DF887E86C3B56539B5046B286001C6F150 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha256 + ProductCode: + - sds + - xes + Description_EN: The SHA-256 of the subject process + Sample: + - 4314A869B8DAE1BD3FFF810B1366E90FB7C961D4A3424260692377FDD87361D2 + - 7824c45fc033696603fe97d8f193a1872dfb2b5db75f0cda21df27017b3cb623 + - 1A6D5986EFEAE89308D9EE11B4A7907012603392E0E66D0E529DB09DF1B4CB64 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashMd5 + ProductCode: + - sds + - xes + Description_EN: The MD5 of the subject process + Sample: + - D07ADD0CE6E000D3CD20193B891E8ED3 + - 1a9ba93ebe4cb60030831f8ce9e7d5f9 + - EEE6691B48D2FB604DDF0CBC90D75B0E + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: policyId + ProductCode: + - ptp + - sao + - xes + - stp + - sds + - pds + - scs + Description_EN: The policy ID of which the event was detected + Sample: + - 00000001-0001-0001-0001-000000007610 + - '007' + - '003' + - TM000001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - pdi + - xns + - sao + - ptp + - xes + - stp + - sig + Description_EN: The GUID of the agent which reported the detection + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: objectName + ProductCode: + - xes + - sds + - sao + Description_EN: The base name of the object file or process + Sample: + - net.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: behaviorCat + ProductCode: + - sao + - xes + - sds + - pds + Description_EN: The matched policy category + Sample: + - Policy Enforcement + - Grey-Detection + - Threat-Detection + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: engineOperation + ProductCode: + - sao + - xes + Description_EN: The operation of the engine event + Sample: + - Set Key + - Invoke API + - Create + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: engVer + ProductCode: + - xes + - sca + - sao + - sfs + Description_EN: The engine version + Sample: + - 1.0.0.1123_1.0.0.1101 + - 9.0.1004 + - 22.540.1001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: mpname + ProductCode: + - sds + - sao + - pds + - ptp + - xes + - stp + Description_EN: The management product name + Sample: + - Cloud One - Workload Security + - Apex Central + - Deep Security Software + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpver + ProductCode: + - sds + - pds + - sao + - xes + Description_EN: The product version + Sample: + - Microsoft-Windows-Security-Auditing + - Level -- Medium security + - TASK1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectPid + ProductCode: + - sao + - sds + - xes + Description_EN: The object process PID + Sample: + - 0 + - 17000 + - 22000 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectRegistryRoot + ProductCode: + - xes + - sds + Description_EN: The name of the object registry root key + Sample: + - HKCR + - HKLM + - HKCU + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSigner + ProductCode: + - sao + - xes + Description_EN: The list of object process signers + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + - SecureWorks Inc + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: patVer + ProductCode: + - sao + - xes + - sca + Description_EN: The version of the behavior pattern + Sample: + - 35.1053.00 + - '630' + - 35.1071.00 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processName + ProductCode: + - sds + - xes + - pds + - scs + - sao + Description_EN: The image name of the process that triggered the event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: false +- Name: processPid + ProductCode: + - sds + - xes + - scs + Description_EN: The PID of the subject process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskLevel + ProductCode: + - sds + - sao + - sca + - xes + - pdi + - xns + Description_EN: The risk level + Sample: + - '1' + - high + - No Risk + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: instanceId + ProductCode: + - sao + - xes + - sds + - sss + - mns + Description_EN: The ID of the instance that indicates the meta-cloud or data + center VM + Sample: + - 52294e7b-f732-c6e9-b2c3-7a6b6f50d101 + - 00030912-c5e7-4348-9012-7c684751c531 + - 0008ae58-db0c-34ee-3e5c-5dfc9b10a739 + - i-0b22a22eec53b9321 + - /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0 + - ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sourceType + ProductCode: + - sao + - scs + - xes + Description_EN: The source type + Sample: + - user defined + - sandbox + - syscall + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: parentName + ProductCode: + - xes + - scs + Description_EN: The image name of the parent process + Sample: + - explorer.exe + - startup.exe + - svchost.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPid + ProductCode: + - sds + - xes + - pds + - scs + Description_EN: The PID of the parent process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSigner + ProductCode: + - xes + Description_EN: The signers of the parent process + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + - Azul Systems, Inc. + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerValid + ProductCode: + - xes + Description_EN: Whether each signer of the parent process is valid + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerValid + ProductCode: + - xes + Description_EN: Whether each signer of the object process is valid + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectApiName + ProductCode: + - xes + Description_EN: The API name + Sample: + - GetIpNetTable + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegType + ProductCode: + - xes + Description_EN: The registry value type + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectDesiredAccess + ProductCode: + - xes + Description_EN: The desired access of the event + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectCreateDispositions + ProductCode: + - xes + Description_EN: The disposition of CreateFile + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: processHashId + ProductCode: + - xes + Description_EN: The FNV of the subject process + Sample: + - '-2965450813604216022' + - '7111735426732308768' + - '-7600358934761747729' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentHashId + ProductCode: + - xes + Description_EN: The FNV of the parent process + Sample: + - '-1364311042632324339' + - '1879227689087156956' + - '4246064157470561345' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: smbSharedName + ProductCode: + - xes + Description_EN: The shared folder name for the server that contains the files + to be opened + Sample: + - C:\sharedfolder + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSigner + ProductCode: + - xes + - sds + Description_EN: The signer name list of the subject process + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + DL_Type: dynamic + DL_Searchable: true +- Name: processSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processImagePath + ProductCode: + - sds + - xes + - pds + - scs + Description_EN: The process triggered by the file event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: suspiciousObject + ProductCode: + - xes + Description_EN: The matched suspicious object + Sample: + - 36ba9de3da9e6f8abfffdda7787ab0ecc16724bb + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: suspiciousObjectType + ProductCode: + - xes + Description_EN: The matched suspicious object type + Sample: + - sha1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: detectionAggregationId + ProductCode: + - xes + Description_EN: The correlation key for detection logs and artifacts + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: integrityLevel + ProductCode: + - xes + Description_EN: The integrity level of a process + Sample: + - 16384 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentIntegrityLevel + ProductCode: + - xes + Description_EN: The integrity level of a parent + Sample: + - 16384 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processActions + ProductCode: + - xes + Description_EN: The process actions + Sample: + - ProcessDump + - FileCollection + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processArtifactIds + ProductCode: + - xes + - sds + - sao + Description_EN: The artifact IDs generated by processAction + Sample: + - 00000000-0000-0000-0000-000000000000_1.dmp + - 11111111-1111-1111-1111-111111111111_2.bak + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectPipeName + ProductCode: + - xes + Description_EN: The object pipe name + Sample: + - \\.\pipe\F451F406BD + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: objectActions + ProductCode: + - xes + Description_EN: The object process actions + Sample: + - ProcessDump + - FileCollection + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectArtifactIds + ProductCode: + - xes + - sds + - sao + Description_EN: The artifact IDs generated by objectAction + Sample: + - 00000000-0000-0000-0000-000000000000_0.dmp + - 11111111-1111-1111-1111-111111111111_2.bak + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectedBackupFolder + ProductCode: + - sds + - sao + - xes + Description_EN: The folder path for detected backup folders + Sample: + - C:\\Program Files (x86)\\Trend Micro\\artifact\\DCE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processPayloadSigner + ProductCode: + - xes + Description_EN: The signer name list of the process payload + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processPayloadSignerValid + ProductCode: + - xes + Description_EN: Whether each signer of the process payload is valid + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processPayloadSignerFlagsAdhoc + ProductCode: + - xes + Description_EN: The list of process payload signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processPayloadSignerFlagsRuntime + ProductCode: + - xes + Description_EN: The list of process payload signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processPayloadSignerFlagsLibValid + ProductCode: + - xes + Description_EN: The list of process payload signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPayloadSigner + ProductCode: + - xes + Description_EN: The signer name list of the parent process payload + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPayloadSignerValid + ProductCode: + - xes + Description_EN: Whether each signer of the parent process payload is valid + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPayloadSignerFlagsAdhoc + ProductCode: + - xes + Description_EN: The list of parent process payload signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPayloadSignerFlagsRuntime + ProductCode: + - xes + Description_EN: The list of parent process payload signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPayloadSignerFlagsLibValid + ProductCode: + - xes + Description_EN: The list of parent process payload signature library + validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processPkgName + ProductCode: + - xes + Description_EN: The process package name + Sample: + - MSTeams + - Microsoft.SkypeApp + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionAggressivenessLevel + ProductCode: + - xes + - sao + - sds + Description_EN: The detection aggressiveness level + Sample: + - 1 + - 2 + - 3 + - 4 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: triggerReason + ProductCode: + - xes + - sao + - sds + Description_EN: The cause of the triggered action + Sample: + - FILEMETA.T1027.009.TRICKBOT.SMITRE1B2, T1027.009 + - ST002 + - Scheduled Scan (custom) + - Scheduled Scan (system) + - 'Remote Scan: the user triggered the Apex One agent from the Trend Vision One + console' + - 'Manual Scan: the user triggered the local agent' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: customAssetTags + ProductCode: + - xes + - sds + - sao + - scs + Description_EN: The list of custom asset tags + Sample: + - '{"os":["linux", "windows"], "org":["bu1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: platformAssetTags + ProductCode: + - xes + - sds + - sao + - scs + Description_EN: The list of platform custom asset tags + Sample: + - '{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointGuid + ProductCode: + - sds + - xes + - sao + Description_EN: Host GUID of the endpoint on which the event was detected + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: endpointHostName + ProductCode: + - sds + - xes + - sao + Description_EN: The host name of the endpoint on which the event was detected + Sample: + - PHILIPSIBE09 + - WHAM6WK8XG2 + - MacBook-Pro-del-Meno + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointIp + ProductCode: + - sds + - xes + - sao + Description_EN: IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + - ::1 + - fe80::1 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: eventId + ProductCode: + - sds + - xes + - sao + Description_EN: Event type + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubId + ProductCode: + - sds + - xes + - sao + Description_EN: The access type + Sample: + - 2 - TELEMETRY_PROCESS_CREATE + - 101 - TELEMETRY_FILE_CREATE + - 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time the agent detected the event + Sample: + - 1657781088000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hostName + ProductCode: + - xes + - sds + - sao + Description_EN: The domain name + Sample: + - localhost + - wpad + - settings-win.data.microsoft.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: integrityLevel + ProductCode: + - xes + - sao + Description_EN: The integrity level of a process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logonUser + ProductCode: + - sds + - xes + - sao + Description_EN: The logon user name + Sample: + - root + - SISTEMA + - oracle + DL_Type: dynamic + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppName + ProductCode: + - xes + - sds + - sao + Description_EN: Name of the app involved in the AMSI event + Sample: + - Exchange Server 2016 + - PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.19041.1 + - PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.14393.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectCmd + ProductCode: + - sds + - xes + - sao + Description_EN: Command line entry of target process + Sample: + - wc -l + - runc init + - docker-init --version + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The md5 hash of target process image or target file + Sample: + - 7ac47235c7bb452a03d3afd872f44c9e + - c9873d83a969645a97f21adc1b164cc5 + - 3b32b378c8b288de6f15e1607a8c2145 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of target process image or target file + Sample: + - ded3833f145989fd86c1f4811b61497298ebc7fd + - c4fa06404142f1994431f9eef3df2cbe0f1998f1 + - 3c01d486ed5aa1ecc2d8f33dc24b0ed59b3e609e + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of target process image or target file + Sample: + - 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8 + - 49fa3e206abf6a1f4546417dbe09f3f06b38847866a4a66de75bd90f39cb6c1c + - 0969321ad5a0923f0f03896ad2c10e49290515c44b721d773942a37f62a24893 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the target process image or target file + Sample: + - /usr/bin/bash + - /bin/bash + - /opt/folder1/probes/system/processes/processes + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectHostName + ProductCode: + - sao + - xes + Description_EN: Server name where Internet event was detected + Sample: + - 10.10.10.10 + - sample.test.org + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: true +- Name: httpReferer + ProductCode: + - sao + - xes + Description_EN: The HTTP header referer + Sample: + - http://10.10.10.10/ + - http://fake/home/ + - http://fake.com/page/Test.jsp + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: objectIntegrityLevel + ProductCode: + - xes + - sao + Description_EN: Integrity level of target process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectIp + ProductCode: + - sao + - xes + Description_EN: IP address of internet event + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: objectIps + ProductCode: + - xes + - sds + - sao + Description_EN: IP address list of internet event + Sample: + - ::1 + - 10.10.10.10 + - ::ffff:10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: objectPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of target process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectPort + ProductCode: + - sao + - xes + Description_EN: The port number used by internet event + Sample: [] + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: objectProcessHashId + ProductCode: + - sao + - xes + - sds + Description_EN: FNV of target process + Sample: + - '1415699552492662761' + - '-100650285065767982' + - '-1139416698673814436' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRawDataStr + ProductCode: + - xes + - sds + - sao + Description_EN: The data contents of the AMSI event + Sample: + - $global:? + - '0' + - "$servicename = \"WinRM\"\n$arrService = Get-Service $servicename\n\nif ($arrService.Status + -ne \"Running\")\n\n{\n\n\tRestart-Service $servicename\n\n\n}\n" + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryData + ProductCode: + - xes + - sds + - sao + Description_EN: The registry value data + Sample: + - '{11111111-1111-1111-1111-111111111111}' + - '1' + - '0' + DL_Type: string + DL_CommonKey: + - RegistryValueData + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryKeyHandle + ProductCode: + - xes + - sds + - sao + Description_EN: The registry key + Sample: + - HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters + - HKLM\system\currentcontrolset\services\w32time\config + - HKLM\system\currentcontrolset\services\tcpip\parameters + DL_Type: string + DL_CommonKey: + - RegistryKey + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryValue + ProductCode: + - sds + - xes + - sao + Description_EN: Registry value name + Sample: + - lastknowngoodtime + - threadingmodel + - epoch + DL_Type: string + DL_CommonKey: + - RegistryValue + DL_Searchable: true + DL_Aggregable: false +- Name: objectSigner + ProductCode: + - xes + - sao + - sds + Description_EN: Certificate signer of object process or file + Sample: + - Microsoft Windows + - Software Signing;Apple Code Signing Certification Authority;Apple Root CA; + - Microsoft Corporation + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: Validity of certificate signer + Sample: + - 1 + - 0 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsAdhoc + ProductCode: + - xes + - sao + Description_EN: The list of object process or file signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsRuntime + ProductCode: + - xes + - sao + Description_EN: The list of object process or file signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsLibValid + ProductCode: + - xes + - sao + Description_EN: The list of object process or file signature library + validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileExtendedAttribute + ProductCode: + - xes + - sao + Description_EN: The extended attributes of the file + Sample: + - com.apple.quarantine + - com.apple.metadata:kMDItemWhereFroms + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: File object's true sub-type + Sample: + - 0 + - 5000 + - 18000 + - 28001 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: File object's true major type + Sample: + - 7 + - 5 + - 18 + - 4051 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUser + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The owner name of the target process or the login user name + Sample: + - root + - SYSTEM + - oracle + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: parentCmd + ProductCode: + - xes + - sds + - sao + Description_EN: The command line entry of the parent process + Sample: + - C:\WINDOWS\system32\services.exe + - C:\Windows\system32\services.exe + - /sbin/launchd + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The md5 hash of parent process + Sample: + - d8e577bf078c45954f4531885478d5a9 + - cd10cb894be2128fca0bf0e2b0c27c16 + - cfd65bed18a1fae631091c3a4c4dd533 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of parent process + Sample: + - d7a213f3cfee2a8a191769eb33847953be51de54 + - 1f912d4bec338ef10b7c9f19976286f8acc4eb97 + - 9ad737cbd8bbdddc96726156dbd3bc03936bf02f + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of parent process + Sample: + - dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674 + - f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881 + - 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the parent process + Sample: + - c:\windows\system32\services.exe + - /usr/bin/bash + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: parentPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of the parent process + Sample: + - 1 + - 976 + - 920 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - xes + - sao + Description_EN: Internal product ID (Deprecated, use productCode) + Sample: + - '2200' + - '751' + - '533' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processCmd + ProductCode: + - xes + - sds + - sao + Description_EN: The command line entry of the subject process + Sample: + - C:\Windows\system32\lsass.exe + - C:\WINDOWS\system32\lsass.exe + - nimbus(processes) + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The MD5 hash of the subject process image + Sample: + - cd10cb894be2128fca0bf0e2b0c27c16 + - 7ac47235c7bb452a03d3afd872f44c9e + - cfd65bed18a1fae631091c3a4c4dd533 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of subject process image + Sample: + - 1f912d4bec338ef10b7c9f19976286f8acc4eb97 + - ded3833f145989fd86c1f4811b61497298ebc7fd + - 9ad737cbd8bbdddc96726156dbd3bc03936bf02f + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of subject process image + Sample: + - f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881 + - 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8 + - 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: processFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the subject process + Sample: + - /usr/bin/bash + - c:\windows\system32\svchost.exe + - c:\windows\system32\lsass.exe + DL_Type: string + DL_CommonKey: + - ProcessFullPath + - ProcessName + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: processHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The FNV of subject process + Sample: + - '7114696589795796819' + - '1307755369266815004' + - '-5015325378148567246' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processName + ProductCode: + - sds + - xes + - sao + Description_EN: The image name of the process that triggered the event + Sample: + - /usr/bin/bash + - c:\windows\system32\svchost.exe + - c:\windows\system32\lsass.exe + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: false +- Name: processPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of the subject process + Sample: + - 4 + - 1 + - 784 + - 792 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUser + ProductCode: + - sds + - xes + - sao + Description_EN: The owner name of subject process image + Sample: + - root + - SYSTEM + - SISTEMA + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: rawDataStr + ProductCode: + - xes + - sao + Description_EN: Windows event raw contents + Sample: + - "{\n \"EventData\" : {\n \"LogonType\" : \"\",\n \"TargetDomainName\"\ + \ : \"\",\n \"TargetLogonId\" : \"\",\n \"TargetUserName\" : \"\",\n\ + \ \"TargetUserSid\" : \"\"\n }\n}\n" + - "{\n \"EventData\" : {\n \"LogonType\" : \"10\",\n \"TargetDomainName\"\ + \ : \"AFASADV\",\n \"TargetLogonId\" : \"14941011731\",\n \"TargetUserName\"\ + \ : \"administrator\",\n \"TargetUserSid\" : \"S-1-5-21-1507008304-2416677881-2121376573-500\"\ + \n }\n}\n" + - "{\n \"EventData\" : {\n \"LogonType\" : \"10\",\n \"TargetDomainName\"\ + \ : \"AIS\",\n \"TargetLogonId\" : \"216921070\",\n \"TargetUserName\"\ + \ : \"MWoodr01\",\n \"TargetUserSid\" : \"S-1-5-21-1873864278-1756520048-3043165120-15057\"\ + \n }\n}\n" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: request + ProductCode: + - sao + - xes + Description_EN: Request URL + Sample: + - http://10.10.10.10/fake/site + - http:///fake/param.cgi?action=list&group=Alarm.Status + - http://fake.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: dpt + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The destination port number + Sample: [] + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The destination IP address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The source port number + Sample: + - 53 + - 5353 + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The source address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: srcFileHashMd5 + ProductCode: + - sao + - xes + Description_EN: The md5 hash of source file + Sample: + - e5d5e9c1f65b8ec7aa5b7f1b1acdd731 + - a6779bf446db07e4c4ba3516b273c496 + - 4bb7334fdadc6eccb8e6ab402aae013b + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashSha1 + ProductCode: + - sao + - xes + Description_EN: The SHA1 hash of source file + Sample: + - 5d34902fecc1760138212ada36be1e742bda5e52 + - dbb14dcda6502ab1d23a7c77d405dafbcbeb439e + - 2292f8109cd756e790c068a52d50f1b0858f503b + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashSha256 + ProductCode: + - sao + - xes + Description_EN: The SHA256 hash of source file + Sample: + - 4eaa002225f4ea2dedcd19b7f1337d7c58ea7dd6d4571c12468dde95e6bcfdaf + - e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80 + - 16b20a3ad485b4fbbe3028c7e743b226db21ea93cacc8b3d7d7d4a731bf02333 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: srcFilePath + ProductCode: + - xes + - sao + - sds + Description_EN: The source file path + Sample: + - \\cnva-apps\megaclockprod\traveler\travelerprint.accdb + - c:\program files\common files\microsoft + shared\clicktorun\officesvcmgrschedule.xml + - q:\a7_dbs\a4_pkg\a4_packaging.accde + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: winEventId + ProductCode: + - xes + - sao + Description_EN: Event ID of Windows event + Sample: + - 11 + - 4624 + - 4670 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventDataIpAddress + ProductCode: + - xes + - sao + Description_EN: The IP address for Windows event 4624 which is "An account was + successfully logged on" + Sample: + - '-' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataLogonType + ProductCode: + - xes + - sao + Description_EN: The logon type for Windows event 4624 which is "An account was + successfully logged on" + Sample: + - '3' + - '5' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataOperation + ProductCode: + - xes + - sao + Description_EN: Windows event 11 + Sample: + - 'Start IWbemServices::ExecQuery - root\ccm : select * from SMS_Authority' + - 'Start IWbemServices::ExecQuery - root\cimv2 : select * from win32_process' + - 'Start IWbemServices::ExecQuery - root\ccm : SELECT * FROM SMS_Authority' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectBmData + ProductCode: + - sds + - xes + Description_EN: The data of BM event + Sample: + - '{"provider":"ORCA","schema_version":1,"data":[{"str":"Access /proc//*"}]}' + - "{\"provider\":\"ORCA\",\"schema_version\":1,\"data\":[{\"str\":\"source '/etc/profile.d/lang.sh'\"\ + }]}" + - "{\"provider\":\"ORCA\",\"schema_version\":1,\"data\":[{\"str\":\"source '/etc/profile.d/bash_completion.sh'\"\ + }]}" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osDescription + ProductCode: + - sds + - xes + - sao + Description_EN: The OS version + Sample: + - Windows 10 (64 bit) + - Windows 10 Pro (64 bit) build 19044 + - Amazon Linux 2 (64 bit) (5.4.188-104.359.amzn2.x86_64) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: instanceId + ProductCode: + - sds + - xes + Description_EN: The virtual machine instance ID on the cloud platform + Sample: + - i-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudProvider + ProductCode: + - sds + - xes + Description_EN: The service provider of the cloud asset + Sample: + - aws + - azure + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vpcId + ProductCode: + - sds + - xes + Description_EN: The virtual private cloud that contains the cloud asset + Sample: + - vpc-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: regionId + ProductCode: + - sds + - xes + Description_EN: The cloud asset region + Sample: + - US East (N. Virginia) + - Europe (Frankfurt) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The event hash ID + Sample: + - '-8406473586387535914' + - '138486453338666581' + - '-7909265752378976284' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The first time the event was seen + Sample: + - 1656355418449 + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: lastSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The last time the event was seen + Sample: + - 1656355418449 + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: endpointMacAddress + ProductCode: + - sds + - xes + - sao + Description_EN: The host MAC address + Sample: + - 0-0-0-0-0-0-0-e0 + - 00:00:00:ff:ff:ff + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userDomain + ProductCode: + - sds + - xes + - sao + Description_EN: The user domain name + Sample: + - CORP + - AUTORIDADE NT + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: timezone + ProductCode: + - sds + - xes + - sao + Description_EN: The host time zone + Sample: + - UTC+00:00 + - UTC-05:00 + - UTC-03:00 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - xes + - sao + Description_EN: The product version + Sample: + - 1.2.0.2752 + - 1.0.345 + - 1.2.0.2657 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: plang + ProductCode: + - sds + - xes + - sao + Description_EN: The product language + Sample: + - 1 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: pplat + ProductCode: + - sds + - xes + - sao + Description_EN: The product platform + Sample: + - 5889 + - 9217 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: osName + ProductCode: + - sds + - xes + - sao + Description_EN: The host operating system name + Sample: + - Windows + - Linux + - macOS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osVer + ProductCode: + - sds + - xes + - sao + Description_EN: The version of the host operating system + Sample: + - Amazon Linux 2 + - 10.0.19044 + - 10.0.19042 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osType + ProductCode: + - sds + - xes + - sao + Description_EN: The host operating system type + Sample: + - '0x00000030' + - '4' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The session ID + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: processUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The process user domain + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time the subject process was launched + Sample: + - '1653614775212' + - '1656118626642' + - '1652098160298' + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: authId + ProductCode: + - xes + - sao + Description_EN: The authorization ID + Sample: + - '999' + - '996' + - '997' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The file hash of the process + Sample: + - '2141057820373638746' + - '-821808160829839906' + - '5222963427542927736' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSigner + ProductCode: + - xes + - sao + - sds + Description_EN: The process file signer + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + - Microsoft Corporation + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: The validity of the process signer + Sample: + - 1 + - 0 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsAdhoc + ProductCode: + - xes + - sao + Description_EN: The list of process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsRuntime + ProductCode: + - xes + - sao + Description_EN: The list of process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsLibValid + ProductCode: + - xes + - sao + Description_EN: The list of process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: The file size of the process file + Sample: + - '59952' + - '59456' + - '47024' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the process file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1635172906000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the process file was modified + Sample: + - '1652131848000' + - '1633413236462' + - '1414554708877' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file type of the process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file subtype of the process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileCurrentOwnerSid + ProductCode: + - xes + - sao + Description_EN: The owner of the process file current security identifier + Sample: + - S-1-5-18 + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileCurrentOwnerName + ProductCode: + - xes + - sao + Description_EN: The current owner name of the process file + Sample: + - NT AUTHORITY\SYSTEM + - BUILTIN\Administrators + - BUILTIN\Administradores + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileOwnerSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the process file owner + Sample: + - S-1-5-32-544 + - S-1-5-18 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The process file owner name + Sample: + - root + - cit + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileGroupSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the process file group + Sample: + - S-1-5-18 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-32-544 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The name of the process file user group + Sample: + - wheel + - admin + - staff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileSaclString + ProductCode: + - sao + - xes + Description_EN: The system access control list of the process file + Sample: + - S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD) + - S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU) + - S:NO_ACCESS_CONTROL + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileDaclString + ProductCode: + - xes + - sao + Description_EN: The discretionary access control list of the process file + Sample: + - D:(A;ID;0x1200a9;;;AC)(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;S-1-15-2-2) + - D:(A;ID;FA;;;SY) + - D:(A;ID;FA;;;BA)(A;ID;FA;;;SY) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileRemoteAccess + ProductCode: + - xes + - sao + Description_EN: The remote access to the process file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The parent hash ID + Sample: + - '-865367326691173681' + - '-2903238741593506113' + - '-4358168316031740439' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentName + ProductCode: + - sds + - xes + - sao + Description_EN: The image name of the parent process + Sample: + - c:\windows\system32\services.exe + - /usr/bin/bash + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The parent session ID + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: parentUser + ProductCode: + - sds + - xes + - sao + Description_EN: The type of user that executed the parent process + Sample: + - root + - SYSTEM + - SISTEMA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The user domain of the parent process + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time when the parent process was launched + Sample: + - '1653614773895' + - '1656118625928' + - '0' + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentAuthId + ProductCode: + - xes + - sao + Description_EN: The parent authorization ID + Sample: + - '999' + - '996' + - '997' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentIntegrityLevel + ProductCode: + - xes + - sao + Description_EN: The integrity level of a parent + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The parent file hash ID + Sample: + - '-4092577940452904134' + - '2141057820373638746' + - '-821808160829839906' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSigner + ProductCode: + - xes + - sao + - sds + Description_EN: The signer of the parent file + Sample: + - Microsoft Windows Publisher + - Microsoft Windows + - Software Signing;Apple Code Signing Certification Authority;Apple Root CA; + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: The validity of the parent signer + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsAdhoc + ProductCode: + - xes + - sao + Description_EN: The list of parent process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsRuntime + ProductCode: + - xes + - sao + Description_EN: The list of parent process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsLibValid + ProductCode: + - xes + - sao + Description_EN: The list of parent process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: The file size of the parent file + Sample: + - '714856' + - '59952' + - '5114880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the parent file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1635172968000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the parent file was modified + Sample: + - '1652131848000' + - '1577865600000' + - '1635172968000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file type of the parent file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file subtype of the parent file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileCurrentOwnerSid + ProductCode: + - xes + - sao + Description_EN: The current security identifier owner of the parent file + Sample: + - S-1-5-32-544 + - S-1-5-18 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileCurrentOwnerName + ProductCode: + - xes + - sao + Description_EN: The current owner name of the parent file + Sample: + - NT AUTHORITY\SYSTEM + - BUILTIN\Administradores + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileOwnerSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the parent file owner + Sample: + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The owner name of the parent file + Sample: + - root + - cit + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileGroupSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the parent process file group + Sample: + - S-1-5-18 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-32-544 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The name of the parent file user group + Sample: + - wheel + - admin + - staff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileSaclString + ProductCode: + - sao + - xes + Description_EN: The system access control list of the parent file + Sample: + - S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD) + - S:NO_ACCESS_CONTROL + - S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileDaclString + ProductCode: + - xes + - sao + Description_EN: The discretionary access control list of the parent file + Sample: + - D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2) + - D:(A;OICI;GA;;;SY)(A;OICI;0xa0120000;;;WD)(A;OICI;GA;;;BA) + - D:(A;ID;0x1200a9;;;AC)(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;S-1-15-2-2) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileRemoteAccess + ProductCode: + - xes + - sao + Description_EN: The remote access to the parent file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The object hash ID + Sample: + - '8576474808125313522' + - '-599270888483415002' + - '2177864258235728980' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectFileSize + ProductCode: + - xes + - sao + - sds + - ddr + Description_EN: The file size of the object file + Sample: + - 0 + - 59456 + - 60 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectCurrentFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: Previous size of modified object file + Sample: + - 0 + - 59456 + - 60 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the object file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1648279273000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the object file was modified + Sample: + - '1652131848000' + - '1577865600000' + - '1648279273000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCurrentOwnerSid + ProductCode: + - xes + - sao + Description_EN: The current security identifier owner of the object file + Sample: + - S-1-5-18 + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCurrentOwnerName + ProductCode: + - xes + - sao + Description_EN: The current owner name of the object file + Sample: + - NT AUTHORITY\SYSTEM + - BUILTIN\Administrators + - BUILTIN\Administradores + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileOwnerSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the object file owner + Sample: + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The object file owner name + Sample: + - root + - NT SERVICE\TrustedInstaller + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileGroupSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the object file group + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-21-397955417-626881126-188441444-513 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The object file user group name + Sample: + - wheel + - staff + - admin + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileSaclString + ProductCode: + - sao + - xes + Description_EN: The system access control list of the object file + Sample: + - S:NO_ACCESS_CONTROL + - S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD) + - S:(AU;SAFA;0x1f0116;;;WD) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileDaclString + ProductCode: + - xes + - sao + Description_EN: The discretionary access control list of the object file + Sample: + - D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2) + - D:(A;OICI;GA;;;SY)(A;OICI;0xa0120000;;;WD)(A;OICI;GA;;;BA) + - D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;AC)(A;ID;0x1200a9;;;S-1-15-2-2) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileIsRemoteAccess + ProductCode: + - sao + - xes + - sds + Description_EN: The remote access to the object file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFirstSeen + ProductCode: + - xes + - sds + - sao + Description_EN: The first time the object was seen + Sample: + - '1656458063638' + - '1656260547165' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLastSeen + ProductCode: + - xes + - sds + - sao + Description_EN: The last time the object was seen + Sample: + - '1656458354730' + - '1656260580722' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashId + ProductCode: + - xes + - sao + - sds + Description_EN: The source file hash ID + Sample: + - '1102079405020678318' + - '-6926286289273504319' + - '8528955148329941480' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcSigner + ProductCode: + - sao + - xes + Description_EN: The signer of the source file + Sample: + - Microsoft Windows + - Microsoft Corporation + - Google LLC + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcSignerValid + ProductCode: + - sao + - xes + Description_EN: The validity of the source file signer + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcSignerFlagsAdhoc + ProductCode: + - xes + - sao + Description_EN: The list of source file signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcSignerFlagsRuntime + ProductCode: + - xes + - sao + Description_EN: The list of source file signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcSignerFlagsLibValid + ProductCode: + - xes + - sao + Description_EN: The list of source file signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileSize + ProductCode: + - xes + - sao + - sds + - ddr + Description_EN: The file size of the source file + Sample: + - '0' + - '131072' + - '196608' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the source file was created + Sample: + - '1577865600000' + - '1626201752000' + - '1626201750000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the source file was modified + Sample: + - '1626201752000' + - '1626201750000' + - '1577865600000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: The true file type of the source file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcSubTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: The true file subtype of the source file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcFileCurrentOwnerSid + ProductCode: + - sao + - xes + Description_EN: The current security identifier owner of the source file + Sample: + - S-1-5-18 + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileCurrentOwnerName + ProductCode: + - sao + - xes + Description_EN: The current owner name of the source file + Sample: + - NT AUTHORITY\SYSTEM + - BUILTIN\Administrators + - AUTORIDADE NT\SISTEMA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileOwnerSid + ProductCode: + - sao + - xes + Description_EN: The security identifier of the source file owner + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-32-544 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The source file owner name + Sample: + - root + - NT SERVICE\TrustedInstaller + - NT AUTHORITY\SYSTEM + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileGroupSid + ProductCode: + - sao + - xes + Description_EN: The security identifier of the source file group + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-21-3770350686-3666354711-3866293128-513 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The source file user group name + Sample: + - wheel + - staff + - NT SERVICE\TrustedInstaller + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileSaclString + ProductCode: + - sao + - xes + Description_EN: The system access control list of the source file + Sample: + - S:NO_ACCESS_CONTROL + - S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD) + - S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileDaclString + ProductCode: + - xes + - sao + Description_EN: The discretionary access control list of the source file + Sample: + - D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2) + - D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;AC)(A;ID;0x1200a9;;;S-1-15-2-2) + - D:(A;ID;FA;;;SY)(A;ID;FA;;;BA) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileIsRemoteAccess + ProductCode: + - xes + - sao + - sds + Description_EN: The remote access of the source file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFirstSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The first time the source file was seen + Sample: + - '0' + - '1656355418449' + - '1656714760440' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcLastSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The last time the source file was seen + Sample: + - '0' + - '1656355418449' + - '1656715147313' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: publicSrc + ProductCode: + - xes + Description_EN: The public ip of the endpoint making the request + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: publicSpt + ProductCode: + - xes + Description_EN: The public port of the endpoint making the request + Sample: + - 57163 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: false +- Name: proxy + ProductCode: + - xes + - sao + Description_EN: The proxy address + Sample: + - proxy.sample:8080 + - 10.10.10.10:8080 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The object file hash ID + Sample: + - '2141057820373638746' + - '-6516669617381620295' + - '-4912169863817247597' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileRemoteAccess + ProductCode: + - xes + - sao + Description_EN: The remote access for the object file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: providerName + ProductCode: + - xes + - sao + Description_EN: The name of the Windows event provider + Sample: + - Microsoft-Windows-Security-Auditing + - Microsoft-Windows-WMI-Activity + - Microsoft-Windows-TaskScheduler + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: providerGUID + ProductCode: + - xes + - sao + Description_EN: The GUID of the Windows event provider + Sample: + - '{11111111-1111-1111-1111-111111111111}' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: channel + ProductCode: + - xes + - sao + Description_EN: The Windows event channel + Sample: + - Security + - Microsoft-Windows-WMI-Activity/Trace + - Microsoft-Windows-TaskScheduler/Operational + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - xes + - sao + Description_EN: The event time + Sample: + - 1657781088000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rawDataSize + ProductCode: + - xes + - sao + Description_EN: The size of the Windows event log + Sample: + - '1128' + - '1129' + - '1127' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: correlationData + ProductCode: + - xes + - sao + Description_EN: The data for correlation + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataProviderPath + ProductCode: + - xes + Description_EN: The file path of the Windows event data provider + Sample: + - '%systemroot%\system32\wbem\ntevt.dll' + - '%systemroot%\system32\wbem\stdprov.dll' + - C:\WINDOWS\CCM\smsclient.dll + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataProviderName + ProductCode: + - xes + Description_EN: The name of the Windows event data provider + Sample: + - SmsClientMethodProvider + - MS_NT_EVENTLOG_PROVIDER + - RegProv + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataLogonProcessName + ProductCode: + - xes + - sao + Description_EN: The name of the Windows event sign in process name + Sample: + - 'NtLmSsp ' + - 'Advapi ' + - Advapi + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataAuthenticationPackageName + ProductCode: + - xes + - sao + Description_EN: The authentication package name of the Windows event data + Sample: + - NTLM + - Negotiate + - MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataStatus + ProductCode: + - xes + - sao + Description_EN: The Windows event data status + Sample: + - '0xc000006d' + - '-1073741715' + - '0xc000006e' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataSubStatus + ProductCode: + - xes + - sao + Description_EN: The Windows event data sub status + Sample: + - '0xc0000064' + - '0xc000006a' + - '-1073741724' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataConsumer + ProductCode: + - xes + Description_EN: The recipient of the reported event + Sample: + - HealthDriverEventConsumer="Health Event Consumer" + - MemoryEventConsumer="Memory Event Consumer" + - SysEventConsumer="System Event Consumer" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataActionName + ProductCode: + - sao + - xes + Description_EN: The action performed + Sample: + - Language Components Installer + - Group Policy Background Processing + - C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTaskName + ProductCode: + - xes + - sao + Description_EN: The task name logged by the Windows event + Sample: + - \Microsoft\Windows\LanguageComponentsInstaller\Installation + - \Microsoft\Office\Office Serviceability Manager + - \MicrosoftEdgeUpdateTaskMachineUA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataUserContext + ProductCode: + - xes + - sao + Description_EN: The user context of the Windows event data + Sample: + - MP\MPBSA179345$ + - MP\MPBSASPU179370$ + - MP\MPBSA4025625$ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataPath + ProductCode: + - xes + - sao + Description_EN: The path of the Windows event data + Sample: + - C:\Program Files\Common Files\Microsoft Shared\ClickToRun\officesvcmgr.exe + - taskhostw.exe + - gpupdate.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectName + ProductCode: + - sds + - xes + - sao + Description_EN: The object name + Sample: + - /usr/bin/bash + - /bin/bash + - /opt/folder1/probes/system/processes/processes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The object session ID + Sample: + - '0' + - '1' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The object launch time of the Windows event + Sample: + - '1616412892557' + - '1620778597056' + - '1616414113105' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAuthId + ProductCode: + - xes + - sao + Description_EN: The object authorization ID + Sample: + - '999' + - '996' + - '997' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The object user domain + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectUserGroup + ProductCode: + - xes + - sao + - sds + Description_EN: The user group name + Sample: + - staff + - _spotlight + - wheel + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The source hash ID + Sample: + - '4070054759888344851' + - '2177864258235728980' + - '3476454206648023552' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: proto + ProductCode: + - sds + - xes + - sao + Description_EN: The protocol type + Sample: + - TELEMETRY_CONNECTION_TCP + - TELEMETRY_CONNECTION_UDP + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: app + ProductCode: + - xes + Description_EN: The layer-7 network protocol being exploited protocol + Sample: + - SMB + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: objectContentName + ProductCode: + - xes + - sds + - sao + Description_EN: The AMSI object content name + Sample: + - C:\Program + Files\WindowsPowerShell\Modules\PowerShellGet\1.2\PowerShellGet.psd1 + - c:\synclog\BLAST_SCAN.vbs + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRawDataSize + ProductCode: + - xes + - sds + - sao + Description_EN: The raw data size of the Windows event object + Sample: + - '9' + - '1' + - '564' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRunAsLocalAccount + ProductCode: + - sds + - xes + - sao + Description_EN: The "runas" command uses a local account + Sample: + - 0 + - 1 + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectApiName + ProductCode: + - xes + Description_EN: The name of the executed API + Sample: + - GetIpNetTable + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectApiHookNum + ProductCode: + - xes + Description_EN: The API hook number of the object + Sample: + - 1 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectApiRvInNum + ProductCode: + - xes + Description_EN: The API telemetry return value + Sample: + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryRoot + ProductCode: + - xes + - sds + - sao + Description_EN: The Windows Registry Root ID + Sample: + - '3' + - '1' + - '2' + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectRegType + ProductCode: + - sds + - xes + - sao + Description_EN: The Windows Registry Type ID + Sample: + - 1 + - 11 + - 4 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectFileAttributesHashId + ProductCode: + - xes + Description_EN: The hash ID of the file attribute meta information + Sample: + - 1626660901647460150 + - -3744588546027069975 + - 8709345175736065179 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCurrentAttributes + ProductCode: + - xes + Description_EN: The original file attributes + Sample: + - 0 + - 34 + - 8224 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectFileAttributes + ProductCode: + - xes + Description_EN: The new file attributes + Sample: + - 2 + - 32 + - 8192 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: nativeDeviceCharacteristics + ProductCode: + - xes + Description_EN: Additional driver device information + Sample: + - 393217 + - 131072 + - 131088 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: nativeDeviceType + ProductCode: + - xes + Description_EN: The underlying hardware type of the driver + Sample: + - 2 + - 7 + - 20 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: nativeStorageDeviceBusType + ProductCode: + - xes + Description_EN: The bus type to which the device is connected + Sample: + - 0 + - 2 + - 17 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: deviceType + ProductCode: + - xes + Description_EN: The disk drive type + Sample: + - TELEMETRY_DEVICE_TYPE_UNKNOWN + - TELEMETRY_DEVICE_TYPE_REMOVABLE + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: codeIntegrityOptionEnabled + ProductCode: + - xes + Description_EN: Whether the system enforced signed kernel loading according to + DSE(driver signature enforcement) + Sample: + - 1 + - 0 + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: codeIntegrityOptionTestsign + ProductCode: + - xes + Description_EN: Whether the system bypassed DSE(driver signature enforcement) + checks and permitted loading of test-signed drivers + Sample: + - 1 + - 0 + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: smbSharedName + ProductCode: + - xes + Description_EN: The shared folder name for the server that contains the files + Sample: + - sharedfolder + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: importTableFileName + ProductCode: + - xes + Description_EN: The library file name which has imported functions + Sample: + - KERNEL32.dll + - ADVAPI32.dll + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: importTableFunctionName + ProductCode: + - xes + Description_EN: The imported function file name + Sample: + - SwitchToThread/GetSystemInfo + - OpenProcessToken + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: importTable + ProductCode: + - xes + Description_EN: The imported table information + Sample: [] + DL_Type: dynamic + DL_Searchable: true +- Name: objectPipeName + ProductCode: + - xes + Description_EN: The named pipe of the event + Sample: + - \\.\pipe\name1 + - \\serverHostName\pipe\name1 + - \\serverIp\pipe\name1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataServiceFileName + ProductCode: + - xes + Description_EN: The full file path of the service executable file + Sample: + - '%SystemRoot%\PSEXESVC.exe' + - C:\Windows\System32\svchost.exe -k WinSysRestoreGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataServiceName + ProductCode: + - xes + Description_EN: The service name + Sample: + - PSEXESVC + - WinResSvc + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudServiceName + ProductCode: + - xes + Description_EN: The cloud service + Sample: + - s3.us-east-1.amazonaws.com + - dynamodb.us-west-2.amazonaws.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudServiceApiName + ProductCode: + - xes + Description_EN: The cloud service API + Sample: + - AssumeRole + - GetCallerIdentity + - ListBuckets + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudIdentityId + ProductCode: + - xes + Description_EN: The Cloud Identity ID used for authorization + Sample: + - arn:aws:sts::111111111111:assumed-role/eksctl-aws-test-nodegroup-ng-21d38-NodeInstanceRole-3wPxVEo4zHlK/i-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudIdentityName + ProductCode: + - xes + Description_EN: The Cloud Identity name used for authorization + Sample: + - AWSsampleToken + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudIdentityAccountId + ProductCode: + - xes + Description_EN: The Cloud Identity account ID used for authorization + Sample: + - '111111111111' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: instanceName + ProductCode: + - xes + Description_EN: The virtual machine that made the request + Sample: + - ec2-123-124-0-12.us-west-2.compute.amazonaws.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: instanceAccountId + ProductCode: + - xes + Description_EN: The cloud account ID of the virtual machine that made the + request + Sample: + - '111111111111' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: azId + ProductCode: + - xes + Description_EN: The Avaliability Zone ID of the virtual machine that made the + request + Sample: + - us-east-1b + - us-west-2a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subnetId + ProductCode: + - xes + Description_EN: The subnet ID of the virtual machine that made the request + Sample: + - subnet-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: networkInterfaceId + ProductCode: + - xes + Description_EN: The network interface of the virtual machine that made the + request + Sample: + - eni-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentUserGroupSids + ProductCode: + - xes + Description_EN: The SIDs of the parent user group + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-21-3770350686-3666354711-3866293128-513 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUserGroupSids + ProductCode: + - xes + Description_EN: The user group SIDs of the process + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-21-3770350686-3666354711-3866293128-513 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUserGroupSids + ProductCode: + - xes + Description_EN: The user group SIDs of the object + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-21-3770350686-3666354711-3866293128-513 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subSystem + ProductCode: + - xes + - sao + Description_EN: The sub system information + Sample: + - com.apple.xpc + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventMessage + ProductCode: + - xes + - sao + Description_EN: The event message + Sample: + - '[0x13bb4e2a0] activating connection: mach=true listener=false peer=false name=com.apple.airportd' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: messageType + ProductCode: + - xes + - sao + Description_EN: The message type + Sample: + - Default + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleId + ProductCode: + - xes + - sao + Description_EN: The rule ID + Sample: + - 1005566 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: additionalInfo + ProductCode: + - xes + - sao + Description_EN: The filter rule info + Sample: + - Default + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutHashId + ProductCode: + - xes + - sao + Description_EN: The FNV of the object sign-in/sign-out meta + Sample: + - -8981232070268295229 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutFirstSeen + ProductCode: + - xes + - sao + Description_EN: The first time the object sign-in/sign-out was seen + Sample: + - '1713903612' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutLastSeen + ProductCode: + - xes + - sao + Description_EN: The last time the object sign-in/sign-out was seen + Sample: + - '1713903612' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutMetaType + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out meta + Sample: + - 1 - LOGIN_OUT_META_TYPE_OPENSSH + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutSourceAddress + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out source IP + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutStatus + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out status + Sample: + - -1 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutFailureMessage + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out error message + Sample: + - Login incorrect + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutSessionId + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out session ID + Sample: + - 260 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the parent image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: processFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the process image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the object image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: requestMethod + ProductCode: + - sao + - xes + - sds + Description_EN: The network protocol request method + Sample: + - GET + - POST + - PUT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: status + ProductCode: + - sao + - xes + - sds + Description_EN: The HTTP response status code + Sample: + - 200 + - 500 + - 403 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventDataModuleILPath + ProductCode: + - xes + - sao + Description_EN: The CIL image path of the module or the dynamic module name + Sample: + - C:\Program Files\Cymulate\Agent\System.Threading.dll + - C:\windows\system32\tzsync.exe + - C:\Program.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataFullyQualifiedAssemblyName + ProductCode: + - xes + - sao + Description_EN: The fully qualified .NET assembly name + Sample: + - System.Runtime, Version=6.0.0.0, Culture=neutral, + PublicKeyToken=b03f5f7f11d50a3a + - System.Xml, Version=4.0.0.0, Culture=neutral, + PublicKeyToken=b77a5c561934e089 + - System.Diagnostics.Process, Version=8.0.0.0, Culture=neutral, + PublicKeyToken=b03f5f7f11d50a3a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTargetDomainName + ProductCode: + - xes + - sao + Description_EN: The target sign-in account domain or computer name + Sample: + - NT AUTHORITY + - Builtin + - SHOCKWAVE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTicketEncryptionType + ProductCode: + - xes + - sao + Description_EN: The cryptographic suite used for the Kerberos TGS + Sample: + - '0x12' + - '0x17' + - '0x18' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataImpersonationLevel + ProductCode: + - xes + - sao + Description_EN: The sign-in session impersonation level + Sample: + - '%%1830' + - '%%1832' + - '%%1833' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataElevatedToken + ProductCode: + - xes + - sao + Description_EN: Whether the session is elevated and has administrator + privileges + Sample: + - '%%1842' + - '%%1843' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataObjectName + ProductCode: + - xes + - sao + Description_EN: The identifying information about the object for which access + was requested + Sample: + - \Device\HarddiskVolume2\Windows\System32\lsass.exe + - C:\Windows\System32\osk.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataObjectType + ProductCode: + - xes + - sao + Description_EN: The object type + Sample: + - Process + - File + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataAccessList + ProductCode: + - xes + - sao + Description_EN: The list of requested access rights + Sample: + - '%%4416' + - '%%4417' + - '%%4418' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataAccessMask + ProductCode: + - xes + - sao + Description_EN: The hexadecimal value of the requested or used permissions + during an access attempt + Sample: + - 0x10 + - 0x80000000 + - 0x100000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataSubjectUserName + ProductCode: + - xes + - sao + Description_EN: The account name + Sample: + - dadmin + - Alex + - london$ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTargetName + ProductCode: + - xes + - sao + Description_EN: The service, application, or network resource name + Sample: + - Microsoft_RssPlatform_* + - WindowsLive:target=virtualapp/didlogical + - MicrosoftOffice* + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataWorkstationName + ProductCode: + - xes + - sao + Description_EN: The name of the computer used in the sign-in attempt + Sample: + - WIN-GG82ULGC9GO + - DESKTOP-123ABC + - CLIENT01 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processStackTrace + ProductCode: + - xes + Description_EN: The process stack trace of the telemetry event + Sample: + - C:\Windows\System32\ntdll.dll?NtCreateUserProcess|ZwCreateUserProcess, + C:\Windows\System32\kernelbase.dll!CreateProcessInternalW + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: customAssetTags + ProductCode: + - xes + - sds + - sao + Description_EN: The list of custom asset tags + Sample: + - '{"os":["linux", "windows"], "org":["bu1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: platformAssetTags + ProductCode: + - xes + - sds + - sao + Description_EN: The list of platform custom asset tags + Sample: + - '{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTicketOptions + ProductCode: + - xes + - sao + Description_EN: The authentication request Kerberos ticket behavior and + permissions flags + Sample: + - '0x40810000' + - '0x40810010' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Endpoint/Trend Cloud One - Endpoint & Workload Security.yaml b/doc_v2/Endpoint/Trend Cloud One - Endpoint & Workload Security.yaml new file mode 100644 index 0000000..f5ef992 --- /dev/null +++ b/doc_v2/Endpoint/Trend Cloud One - Endpoint & Workload Security.yaml @@ -0,0 +1,4481 @@ +- Name: hostName + ProductCode: + - pdi + - xns + - sds + - pds + - ptn + Description_EN: The computer name of the client host (The hostname from the + suspicious URL detected by Deep Discovery Inspector) + Sample: + - Let's Encrypt + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: interestedHost + ProductCode: + - sds + - pdi + - xns + - pds + - sao + Description_EN: The endpoint hostname (For example, if an intranet host + accesses a suspicious internet host, the intranet host is the "peerHost" and + the internet host is the "interestedHost") + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - es-dtc-w-dc02.example.corp + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: true +- Name: shost + ProductCode: + - sds + - pdi + - xns + - pds + - mns + Description_EN: The source hostname + Sample: + - dns.google + - sw_us-east-1a_10-124-17-69 + - sw_us-east-1c_10-124-21-139 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: category + ProductCode: + - ptp + - mns + - sds + Description_EN: The event category + Sample: + - Exploits + - Reconnaissance + - Vulnerabilities + - Security Policy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: interestedIp + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - ptn + Description_EN: The IP of the interestedHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: endpointIp + ProductCode: + - sds + - pds + - sao + - ptp + - stp + - ptn + - sss + - ddr + Description_EN: The IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: objectFileName + ProductCode: + - sao + - scs + - sds + Description_EN: The object file name + Sample: + - powershell.exe + - wmiprvse.exe + - dismhost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileSize + ProductCode: + - sds + Description_EN: The object file size + Sample: + - '0' + - '59456' + - '60' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileName + ProductCode: + - pdi + - xns + - sao + - sfs + - sfc + - sds + - sss + - scs + Description_EN: The file name of the compressed file + Sample: + - /proc/32058/fd/150 + - NONAMEFL + - /proc/10006/fd/30 + - VirusActionSample/RPF2_OtherMalwareSample-other.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: filePath + ProductCode: + - sds + - pds + - sao + - pdi + - xns + - pts + - sfs + - sfc + Description_EN: The file path without the file name + Sample: + - security + - /var/log/audit/audit.log + - application + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: filePathName + ProductCode: + - sds + - pdi + - xns + - pds + - pts + Description_EN: The file path with the file name + Sample: + - vss + - spoolss + - /etc/hosts + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: objectFilePath + ProductCode: + - sao + - sds + - xes + - scs + Description_EN: The file path of the target process image or target file + Sample: + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - zwwritevirtualmemory + - c:\windows\system32\wbem\wmiprvse.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileHash + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-1 of the decompressed archive + Sample: + - 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA + - FA71B59F35F0EE44D27F74917EF5A0DA2797E80B + - 14D2302172EB81465CE12E01361AE24CDE170F7B + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha1 + ProductCode: + - sao + - xes + - sds + Description_EN: The SHA-1 of the objectFilePath object + Sample: + - 51B8646308EE0B68AD1F7F1291B85395434DE49A + - 36C5D12033B2EAF251BAE61C00690FFB17FDDC87 + - 2586528000199793730B05D3F169BCF139E4D7A1 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: oldFileHash + ProductCode: + - sds + - pds + Description_EN: The SHA-1 of the target process image or target file + (wasEntity from an IM event) + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 57247B810B0EE61DD86CE24AC14097B9B5405EEC + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHashSha256 + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-256 of the compressed suspicious file + Sample: + - 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F + - 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE + - 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha256 + ProductCode: + - sao + - xes + - sds + Description_EN: The SHA-256 of the object (objectFilePath) + Sample: + - A75C85F3B089993E9C042FB82ECB7757E8F460ED8065FC7991CAA38A6DE0F50C + - 908B64B1971A979C7E3E8CE4621945CBA84854CB98D76367B791A6E22B5F6D53 + - 1A2ABAAD8A166B66CA35AB51C7432C5A7E46996472C8174281842896408D7F96 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashMd5 + ProductCode: + - sao + - xes + - sds + Description_EN: The MD5 of the object + Sample: + - 801E8003C257C8F540B20F1E0DECD3A6 + - CDA48FC75952AD12D99E526D0B6BF70A + - D5120786925038601A77C2E1EB9A3A0A + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: processCmd + ProductCode: + - sds + - xes + - pds + - sao + - scs + Description_EN: The subject process command line + Sample: + - '"C:\Program Files (x86)\AADM\AADM.exe" ' + - /usr/lib/inet/sendmail -bl -q15m + - ComDir + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectCmd + ProductCode: + - sao + - sds + - xes + Description_EN: The object process command line + Sample: + - C:\WINDOWS\system32\wbem\wmiprvse.exe -Embedding + - "\"C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe\" -NoLogo -Noninteractive + -NoProfile -ExecutionPolicy Bypass \"& 'C:\\WINDOWS\\CCM\\SystemTemp\\afd6f0e5-e491-4764-a20a-9f1d9edf3cce.ps1'\"" + - C:\WINDOWS\system32\lsass.exe + DL_Type: dynamic + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryData + ProductCode: + - xes + - sao + - sds + Description_EN: The registry data contents + Sample: + - C:\Program Files\AlertMedia\AlertMedia Desktop Notifications\AlertMedia.exe + DL_Type: string + DL_CommonKey: + - RegistryValueData + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryKeyHandle + ProductCode: + - xes + - sds + - sao + Description_EN: The registry key path + Sample: + - HKCR\CID\{00000000-0000-0000-0000-000000000001} + - HKLM\SOFTWARE\WOW6432Node\Eos + - HKCU\SOFTWARE\Cerner\InstantAccess + DL_Type: string + DL_CommonKey: + - RegistryKey + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryValue + ProductCode: + - xes + - sao + - sds + Description_EN: The registry value name + Sample: + - '1' + - key + - reg + DL_Type: string + DL_CommonKey: + - RegistryValue + DL_Searchable: true + DL_Aggregable: false +- Name: objectType + ProductCode: + - sca + - sds + - sao + - sem + - xes + - sfs + Description_EN: The object type + Sample: + - file + - process + - qil + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFilePath + ProductCode: + - sao + - sds + - xes + Description_EN: The file path of the subject process + Sample: + - c:\windows\system32\svchost.exe + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - c:\windows\syswow64\srts\wmipr.exe + DL_Type: string + DL_CommonKey: + - ProcessFullPath + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: duser + ProductCode: + - sds + - pds + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email recipient + Sample: + - (no user) + - SYSTEM + - ' SYSTEM' + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: true +- Name: tags + ProductCode: + - ALL + - sds + - sao + - pdi + - xns + Description_EN: The detected technique ID based on the alert filter + Sample: + - MITREV9.T1090 + - MITRE.T1071 + - MITREV9.T1059.001 + DL_Type: dynamic + DL_CommonKey: + - Technique + - Tactic + DL_Searchable: true + DL_Aggregable: true +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleId + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - mns + Description_EN: The rule ID + Sample: + - 1002795 + - 1003802 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubName + ProductCode: + - sao + - sca + - sds + - sem + - xes + - sig + - sss + Description_EN: The event type sub-name + Sample: + - IPS Detection + - Personal Firewall + - Attack Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subRuleId + ProductCode: + - sds + - pds + - stp + Description_EN: ID of a subordinate rule + Sample: + - '85262' + - '914520' + - '18152' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subRuleName + ProductCode: + - sds + - pds + - sca + - sem + - xms + Description_EN: The subrule name + Sample: + - Pre-authentication failed. + - 'ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System + Logs,File Deletion ' + - 'ATTACK T1110: Multiple Windows Logon Failures' + - invisible_url_domain + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA-1 of the subject process + Sample: + - C0885381EBAC94AB20E78936434FA208F6B65352 + - ac373ed32b491da22924e2e11e36574e5d582a35 + - DF93F7DF887E86C3B56539B5046B286001C6F150 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha256 + ProductCode: + - sds + - xes + Description_EN: The SHA-256 of the subject process + Sample: + - 4314A869B8DAE1BD3FFF810B1366E90FB7C961D4A3424260692377FDD87361D2 + - 7824c45fc033696603fe97d8f193a1872dfb2b5db75f0cda21df27017b3cb623 + - 1A6D5986EFEAE89308D9EE11B4A7907012603392E0E66D0E529DB09DF1B4CB64 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashMd5 + ProductCode: + - sds + - xes + Description_EN: The MD5 of the subject process + Sample: + - D07ADD0CE6E000D3CD20193B891E8ED3 + - 1a9ba93ebe4cb60030831f8ce9e7d5f9 + - EEE6691B48D2FB604DDF0CBC90D75B0E + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: policyId + ProductCode: + - ptp + - sao + - xes + - stp + - sds + - pds + - scs + Description_EN: The policy ID of which the event was detected + Sample: + - 00000001-0001-0001-0001-000000007610 + - '007' + - '003' + - TM000001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: actResult + ProductCode: + - sao + - sca + - sds + - pds + - pts + - ams + Description_EN: The result of an action + Sample: + - Dropped + - Successful + - Accepted + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: objectIp + ProductCode: + - sds + Description_EN: The IP address of the domain + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: httpReferer + ProductCode: + - pdi + - xns + - sds + - sao + Description_EN: The HTTP referer + Sample: + - http://172.16.58.233/ + - http://example/page1/ + - https://www.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: objectName + ProductCode: + - xes + - sds + - sao + Description_EN: The base name of the object file or process + Sample: + - net.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUser + ProductCode: + - sds + - sao + Description_EN: The user name of the process or the file creator + Sample: + - SYSTEM + - SVC_JENKINS_CODE_DEV + - NETWORK SERVICE + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: processUserId + ProductCode: + - sds + Description_EN: The process user ID or file creator + Sample: + - '0' + - S-1-5-1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUserGroupName + ProductCode: + - sds + Description_EN: The process user group name or file creator + Sample: + - root + - NT AUTHORITY + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUserGroupId + ProductCode: + - sds + Description_EN: The process user group ID or file creator + Sample: + - '0' + - S-1-5-1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cves + ProductCode: + - ptp + - sds + - pdi + - xns + Description_EN: The CVEs associated with this filter + Sample: + - CVE-2014-3567 + - CVE-2016-6304 + - CVE-2011-1385 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - pdi + - xns + - sws + - sao + - sig + - sca + - ams + - sds + Description_EN: The requested URL category + Sample: + - Untested + - '158' + - Web Advertisement + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: majorVirusType + ProductCode: + - pds + - sds + - ams + - ptn + - pts + - sfc + Description_EN: The virus type + Sample: + - Virus + - Suspicious Activity + - Trojan + - TROJ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudProvider + ProductCode: + - sds + - sfc + - sss + Description_EN: The service provider of the cloud asset + Sample: + - alibaba cloud + - aws + - azure + - gcp + - oci + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vpcId + ProductCode: + - sds + - sss + Description_EN: The virtual private cloud that contains the cloud asset + Sample: + - vpc-01234567890abcdef + - avtd-vnet-ozyww04h + - ocid1.vnic.oc1.iad.abuwcljs4szq5rylkxikcthyegnqn5mjhkyn3xwtoa3uvbonxqn52nofibgq + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: regionId + ProductCode: + - sds + Description_EN: The cloud asset region + Sample: + - US East (N. Virginia) + - Europe (Frankfurt) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: behaviorCat + ProductCode: + - sao + - xes + - sds + - pds + Description_EN: The matched policy category + Sample: + - Policy Enforcement + - Grey-Detection + - Threat-Detection + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cat + ProductCode: + - sds + - pds + - sao + Description_EN: The weighted priority of the incident + Sample: + - 100 + - 200 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dmac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The MAC address of the destination IP (dest_ip) + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileOperation + ProductCode: + - sds + - pds + Description_EN: The operation of the file + Sample: + - Created + - Updated + - Deleted + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstAct + ProductCode: + - sds + - sao + - pds + Description_EN: The first scan action + Sample: + - Pass + - Quarantine + - Clean + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstActResult + ProductCode: + - sds + - sao + - pds + Description_EN: The first scan action result + Sample: + - File passed + - Unable to quarantine file + - File quarantined + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: groups + ProductCode: + - sds + - pds + Description_EN: The OSSEC rule group names + Sample: + - auditd,audit, + - dirservice_log,authentication_failure, + - windows,authentication_failures, + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hostId + ProductCode: + - sds + - pds + Description_EN: The host ID + Sample: + - 20548 + - 967 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: mDeviceGUID + ProductCode: + - sds + - sao + - pds + Description_EN: The GUID of the agent host + Sample: + - C5B09EDD-C725-907F-29D9-B8C30D18C48F + - C05B75AB-B518-BDD0-D2B5-E9CB631C539F + - 9C28ACD3-D0EC-22A4-B08D-5B0BEFF501FC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malFamily + ProductCode: + - pdi + - xns + - sao + - sds + - sfs + Description_EN: The threat family + Sample: + - EQUATED + - STARTER + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malType + ProductCode: + - pdi + - xns + - sds + - sao + - pds + - sfs + - scs + Description_EN: The risk type for Network Content Correlation Engine rules + Sample: + - OTHERS + - MALWARE + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpname + ProductCode: + - sds + - sao + - pds + - ptp + - xes + - stp + Description_EN: The management product name + Sample: + - Cloud One - Workload Security + - Apex Central + - Deep Security Software + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpver + ProductCode: + - sds + - pds + - sao + - xes + Description_EN: The product version + Sample: + - Microsoft-Windows-Security-Auditing + - Level -- Medium security + - TASK1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCreation + ProductCode: + - sao + - sds + Description_EN: The UTC time that the object was created + Sample: + - '2014-11-22T01:45:51-06:00' + - '2009-07-13T23:31:13-05:00' + - '2014-11-21T02:43:28-05:00' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileModified + ProductCode: + - sao + - sds + Description_EN: The UTC time that the object was modified + Sample: + - '2024-10-10T10:10:10.0000000Z' + - '2024-11-11T11:11:11.0000000Z' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectPid + ProductCode: + - sao + - sds + - xes + Description_EN: The object process PID + Sample: + - 0 + - 17000 + - 22000 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectRegistryRoot + ProductCode: + - xes + - sds + Description_EN: The name of the object registry root key + Sample: + - HKCR + - HKLM + - HKCU + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUser + ProductCode: + - sao + - sds + Description_EN: The owner name of the target process or the login user name + Sample: + - Système + - SYSTEM + - SISTEMA + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: objectUserDomain + ProductCode: + - sds + - sao + Description_EN: The owner domain of the target process + Sample: + - NT AUTHORITY + - UNEB + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: out + ProductCode: + - sds + - pds + Description_EN: The IP datagram length (in bytes) + Sample: + - '0' + - '439' + - '1314' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileCreation + ProductCode: + - sds + Description_EN: The Unix time of object creation + Sample: + - '1645828113585' + - '1655412594237' + - '1647162053219' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processName + ProductCode: + - sds + - xes + - pds + - scs + - sao + Description_EN: The image name of the process that triggered the event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: false +- Name: processPid + ProductCode: + - sds + - xes + - scs + Description_EN: The PID of the subject process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUserDomain + ProductCode: + - sds + Description_EN: The owner domain of the subject process image + Sample: + - NT AUTHORITY + - DOMAINBA + - PAEDMZ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: proto + ProductCode: + - sds + - pds + - ptn + - scs + - mns + Description_EN: The exploited layer network protocol + Sample: + - '6' + - TCP + - '17' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: protoFlag + ProductCode: + - sds + - pds + Description_EN: The data flags + Sample: + - ACK PSH DF=1 + - ACK DF=1 + - DF=1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestClientApplication + ProductCode: + - pdi + - xns + - sds + - sao + Description_EN: The protocol user agent information + Sample: + - Microsoft-Delivery-Optimization/10.0 + - Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) + - example Software GmbH + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskLevel + ProductCode: + - sds + - sao + - sca + - xes + - pdi + - xns + Description_EN: The risk level + Sample: + - '1' + - high + - No Risk + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtDate + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The date of the log generation + Sample: + - 1655337600000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rtHour + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The hour of the log generation + Sample: + - 9 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtWeekDay + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The weekday of the log generation + Sample: + - Monday + - Tuesday + - Friday + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleType + ProductCode: + - sds + - sao + - sca + - szn + Description_EN: The access rule type + Sample: + - udso + - point of entry + - unknown + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: score + ProductCode: + - pdi + - xns + - sao + - sca + - ams + - sds + Description_EN: The Web Reputation Services URL rating + Sample: + - 71 + - 81 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: secondAct + ProductCode: + - sds + - sao + - pds + Description_EN: The second scan action + Sample: + - Unknown + - N/A + - Deny Access + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: secondActResult + ProductCode: + - sds + - sao + - pds + Description_EN: The result of the second scan action + Sample: + - Unknown + - N/A + - Access denied + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: senderGUID + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The sender GUID + Sample: + - 346648FC-9862-D2F0-F94C-FAB1A838ABD7 + - 36E5239E-EEBA-0100-C10E-C057E0455E1D + - 9606BBD5-38A7-9024-83C8-9C88A2AF90CC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: smac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The source MAC address + Sample: + - 00:11:22:33:44:55 + - 66:77:88:99:AA:BB + - CC:DD:EE:FF:00:11 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sproc + ProductCode: + - sds + - pds + Description_EN: The OSSEC program name + Sample: + - postfix/sendmail + - CRON + - sshd + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: instanceId + ProductCode: + - sao + - xes + - sds + - sss + - mns + Description_EN: The ID of the instance that indicates the meta-cloud or data + center VM + Sample: + - 52294e7b-f732-c6e9-b2c3-7a6b6f50d101 + - 00030912-c5e7-4348-9012-7c684751c531 + - 0008ae58-db0c-34ee-3e5c-5dfc9b10a739 + - i-0b22a22eec53b9321 + - /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0 + - ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPid + ProductCode: + - sds + - xes + - pds + - scs + Description_EN: The PID of the parent process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mitreVersion + ProductCode: + - pdi + - xns + - sds + - pds + Description_EN: The MITRE version + Sample: + - v9 + - v6 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: wasEntity + ProductCode: + - sds + - pds + Description_EN: The entity before change/modification + Sample: + - '{"key":"","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"stopped","name":"state","value":"1"}]}' + - '{"key":"","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"running","name":"state","value":"4"}]}' + - '{"key":"","type":"File","attributes":[]}' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: isEntity + ProductCode: + - sds + - pds + Description_EN: The current entity (or after change/modification) + Sample: + - '{"key":"","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"running","name":"state","value":"4"}]}' + - '{"key":"":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"stopped","name":"state","value":"1"}]}' + - '{"key":"","type":"File","attributes":[]}' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: targetType + ProductCode: + - sds + - pds + Description_EN: The target object type + Sample: + - File System + - Uncategorized + - Exploit + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleVer + ProductCode: + - sca + - sds + - sem + - xms + Description_EN: The rule version + Sample: + - '202207060001' + - '202207190001' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processLaunchTime + ProductCode: + - sds + Description_EN: The time the subject process was launched + Sample: + - '1656400286556' + - '1656566610259' + - '1656587180493' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventSubId + ProductCode: + - sds + - pts + Description_EN: The access type + Sample: + - '4' + - '101' + - '102' + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleSetName + ProductCode: + - scs + - stp + - ptp + - sds + Description_EN: The rule set name + Sample: + - AllRules + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSigner + ProductCode: + - xes + - sds + Description_EN: The signer name list of the subject process + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + DL_Type: dynamic + DL_Searchable: true +- Name: parentUser + ProductCode: + - sds + Description_EN: The account name of the parent process + Sample: + - Administrator + DL_Type: string + DL_Searchable: true +- Name: parentUserDomain + ProductCode: + - sds + Description_EN: The domain name of the parent process + Sample: + - builtindomain + DL_Type: string + DL_Searchable: true +- Name: processImagePath + ProductCode: + - sds + - xes + - pds + - scs + Description_EN: The process triggered by the file event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFilePath + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The file path of the quarantined object + Sample: + - C:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: winEventId + ProductCode: + - sds + - pds + Description_EN: The Windows Event ID + Sample: + - 11 + - 4624 + - 4670 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processArtifactIds + ProductCode: + - xes + - sds + - sao + Description_EN: The artifact IDs generated by processAction + Sample: + - 00000000-0000-0000-0000-000000000000_1.dmp + - 11111111-1111-1111-1111-111111111111_2.bak + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectArtifactIds + ProductCode: + - xes + - sds + - sao + Description_EN: The artifact IDs generated by objectAction + Sample: + - 00000000-0000-0000-0000-000000000000_0.dmp + - 11111111-1111-1111-1111-111111111111_2.bak + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: censusMaturityValue + ProductCode: + - sds + - sao + Description_EN: The CENSUS maturity value + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: censusPrevalenceValue + ProductCode: + - sds + - sao + Description_EN: The CENSUS prevalence value + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dceArtifactActions + ProductCode: + - sds + - sao + Description_EN: The actions performed on Damage Cleanup Engine artifacts + Sample: + - folder_backup + - objproc_dump + - subproc_dump + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: detectedBackupFolder + ProductCode: + - sds + - sao + - xes + Description_EN: The folder path for detected backup folders + Sample: + - C:\\Program Files (x86)\\Trend Micro\\artifact\\DCE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectedBackupArtifacts + ProductCode: + - sds + - sao + Description_EN: The information about detected artifacts + Sample: + - '{"objectArtifactId": "025d9f2a-ac9c-4cdf-b9e4-cf20c6e40281_0.dmp", "action": + "object_process_dump", "status": 0, "processCreationTime": "1627574338077", "processImageFileName": + "C:\Program Files\aaa\bbb\objprocess.exe"}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionEngineVersion + ProductCode: + - sds + - sao + Description_EN: The detection engine version + Sample: + - 7.6.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectedPattern + ProductCode: + - sds + - sao + Description_EN: The detected pattern + Sample: + - dct.virus + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: isProxy + ProductCode: + - sds + - sao + Description_EN: Whether something is a proxy + Sample: + - false + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: moduleScanType + ProductCode: + - sds + - sao + Description_EN: The module scan type + Sample: + - traditional + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: objectAttributes + ProductCode: + - sds + - sao + Description_EN: The object attributes + Sample: + - attribute + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileAccess + ProductCode: + - sds + - sao + Description_EN: The object file access details + Sample: + - 1717658631000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: originalFileHashes + ProductCode: + - sds + - sao + Description_EN: The hashes of the original file + Sample: + - ba4700bfd55741c657a99fbe416787835fb384da + - 639dfe4a69c1e6aace1e4eece3b3bb25af6a1392 + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: originalFilePaths + ProductCode: + - sds + - sao + Description_EN: The paths of the original file + Sample: + - C:\\Users\\user_name\\Downloads\\run.exe + DL_Type: dynamic + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: trigger + ProductCode: + - sds + - sao + Description_EN: The action trigger + Sample: + - ATSE + - On-demand scan + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: detectedActions + ProductCode: + - sds + - sao + Description_EN: The actions performed on detected artifacts + Sample: + - folder_backup + - objproc_dump + - subproc_dump + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processImageFileNames + ProductCode: + - sds + - sao + Description_EN: The process image file names of detected backup artifacts + Sample: + - C:\Program Files\aaa\bbb\objprocess.exe + - C:\Program Files\ccc\ddd\sample.exe + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: target + ProductCode: + - sds + - pds + Description_EN: The target object for the behavior + Sample: + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - zwwritevirtualmemory + - /proc/211296/exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionAggressivenessLevel + ProductCode: + - xes + - sao + - sds + Description_EN: The detection aggressiveness level + Sample: + - 1 + - 2 + - 3 + - 4 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: detectedBackupArtifactsStatus + ProductCode: + - sds + - sao + Description_EN: The backup status of detected artifacts + Sample: + - ['0', '-67'] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: triggerReason + ProductCode: + - xes + - sao + - sds + Description_EN: The cause of the triggered action + Sample: + - FILEMETA.T1027.009.TRICKBOT.SMITRE1B2, T1027.009 + - ST002 + - Scheduled Scan (custom) + - Scheduled Scan (system) + - 'Remote Scan: the user triggered the Apex One agent from the Trend Vision One + console' + - 'Manual Scan: the user triggered the local agent' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: customAssetTags + ProductCode: + - xes + - sds + - sao + - scs + Description_EN: The list of custom asset tags + Sample: + - '{"os":["linux", "windows"], "org":["bu1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: platformAssetTags + ProductCode: + - xes + - sds + - sao + - scs + Description_EN: The list of platform custom asset tags + Sample: + - '{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionAggregationIds + ProductCode: + - sao + - sds + Description_EN: The list of detection aggregation IDs + Sample: + - [11111111-1111-1111-1111-111111111111] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: triggerInfo + ProductCode: + - sao + - sds + Description_EN: The trigger information + Sample: + - [{triggerModule: ODS, triggerReason: System Schedule Scan}] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileId + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The unique identifier of the quarantined object + Sample: + - ASLUMVS0.4FC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileSha256 + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The SHA-256 of the quarantined object + Sample: + - 84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: detectionNames + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The rules that triggered the event + Sample: + - [HS_EMOTET.SMAA, HM_AVEDOWN.SMZTIG-A, HE_DOCQRPHISH.SM] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: detectionMeta + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The descriptions of the detected techniques + Sample: + - [T1204 some description about this technique, T1573.001_AES another + description about this technique] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: startTime + ProductCode: + - sds + Description_EN: The time when the first event was received (in Unix + milliseconds) + Sample: + - 1750983848000 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endTime + ProductCode: + - sds + Description_EN: The time when the last event was received (in Unix + milliseconds) + Sample: + - 1750983926000 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointGuid + ProductCode: + - sds + - xes + - sao + Description_EN: Host GUID of the endpoint on which the event was detected + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: endpointHostName + ProductCode: + - sds + - xes + - sao + Description_EN: The host name of the endpoint on which the event was detected + Sample: + - PHILIPSIBE09 + - WHAM6WK8XG2 + - MacBook-Pro-del-Meno + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointIp + ProductCode: + - sds + - xes + - sao + Description_EN: IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + - ::1 + - fe80::1 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: eventId + ProductCode: + - sds + - xes + - sao + Description_EN: Event type + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubId + ProductCode: + - sds + - xes + - sao + Description_EN: The access type + Sample: + - 2 - TELEMETRY_PROCESS_CREATE + - 101 - TELEMETRY_FILE_CREATE + - 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time the agent detected the event + Sample: + - 1657781088000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hostName + ProductCode: + - xes + - sds + - sao + Description_EN: The domain name + Sample: + - localhost + - wpad + - settings-win.data.microsoft.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: logonUser + ProductCode: + - sds + - xes + - sao + Description_EN: The logon user name + Sample: + - root + - SISTEMA + - oracle + DL_Type: dynamic + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppName + ProductCode: + - xes + - sds + - sao + Description_EN: Name of the app involved in the AMSI event + Sample: + - Exchange Server 2016 + - PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.19041.1 + - PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.14393.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectCmd + ProductCode: + - sds + - xes + - sao + Description_EN: Command line entry of target process + Sample: + - wc -l + - runc init + - docker-init --version + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The md5 hash of target process image or target file + Sample: + - 7ac47235c7bb452a03d3afd872f44c9e + - c9873d83a969645a97f21adc1b164cc5 + - 3b32b378c8b288de6f15e1607a8c2145 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of target process image or target file + Sample: + - ded3833f145989fd86c1f4811b61497298ebc7fd + - c4fa06404142f1994431f9eef3df2cbe0f1998f1 + - 3c01d486ed5aa1ecc2d8f33dc24b0ed59b3e609e + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of target process image or target file + Sample: + - 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8 + - 49fa3e206abf6a1f4546417dbe09f3f06b38847866a4a66de75bd90f39cb6c1c + - 0969321ad5a0923f0f03896ad2c10e49290515c44b721d773942a37f62a24893 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the target process image or target file + Sample: + - /usr/bin/bash + - /bin/bash + - /opt/folder1/probes/system/processes/processes + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectIps + ProductCode: + - xes + - sds + - sao + Description_EN: IP address list of internet event + Sample: + - ::1 + - 10.10.10.10 + - ::ffff:10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: objectPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of target process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectProcessHashId + ProductCode: + - sao + - xes + - sds + Description_EN: FNV of target process + Sample: + - '1415699552492662761' + - '-100650285065767982' + - '-1139416698673814436' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRawDataStr + ProductCode: + - xes + - sds + - sao + Description_EN: The data contents of the AMSI event + Sample: + - $global:? + - '0' + - "$servicename = \"WinRM\"\n$arrService = Get-Service $servicename\n\nif ($arrService.Status + -ne \"Running\")\n\n{\n\n\tRestart-Service $servicename\n\n\n}\n" + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryData + ProductCode: + - xes + - sds + - sao + Description_EN: The registry value data + Sample: + - '{11111111-1111-1111-1111-111111111111}' + - '1' + - '0' + DL_Type: string + DL_CommonKey: + - RegistryValueData + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryKeyHandle + ProductCode: + - xes + - sds + - sao + Description_EN: The registry key + Sample: + - HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters + - HKLM\system\currentcontrolset\services\w32time\config + - HKLM\system\currentcontrolset\services\tcpip\parameters + DL_Type: string + DL_CommonKey: + - RegistryKey + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryValue + ProductCode: + - sds + - xes + - sao + Description_EN: Registry value name + Sample: + - lastknowngoodtime + - threadingmodel + - epoch + DL_Type: string + DL_CommonKey: + - RegistryValue + DL_Searchable: true + DL_Aggregable: false +- Name: objectSigner + ProductCode: + - xes + - sao + - sds + Description_EN: Certificate signer of object process or file + Sample: + - Microsoft Windows + - Software Signing;Apple Code Signing Certification Authority;Apple Root CA; + - Microsoft Corporation + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: Validity of certificate signer + Sample: + - 1 + - 0 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: File object's true sub-type + Sample: + - 0 + - 5000 + - 18000 + - 28001 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: File object's true major type + Sample: + - 7 + - 5 + - 18 + - 4051 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUser + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The owner name of the target process or the login user name + Sample: + - root + - SYSTEM + - oracle + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: parentCmd + ProductCode: + - xes + - sds + - sao + Description_EN: The command line entry of the parent process + Sample: + - C:\WINDOWS\system32\services.exe + - C:\Windows\system32\services.exe + - /sbin/launchd + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The md5 hash of parent process + Sample: + - d8e577bf078c45954f4531885478d5a9 + - cd10cb894be2128fca0bf0e2b0c27c16 + - cfd65bed18a1fae631091c3a4c4dd533 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of parent process + Sample: + - d7a213f3cfee2a8a191769eb33847953be51de54 + - 1f912d4bec338ef10b7c9f19976286f8acc4eb97 + - 9ad737cbd8bbdddc96726156dbd3bc03936bf02f + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of parent process + Sample: + - dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674 + - f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881 + - 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the parent process + Sample: + - c:\windows\system32\services.exe + - /usr/bin/bash + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: parentPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of the parent process + Sample: + - 1 + - 976 + - 920 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - xes + - sao + Description_EN: Internal product ID (Deprecated, use productCode) + Sample: + - '2200' + - '751' + - '533' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processCmd + ProductCode: + - xes + - sds + - sao + Description_EN: The command line entry of the subject process + Sample: + - C:\Windows\system32\lsass.exe + - C:\WINDOWS\system32\lsass.exe + - nimbus(processes) + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The MD5 hash of the subject process image + Sample: + - cd10cb894be2128fca0bf0e2b0c27c16 + - 7ac47235c7bb452a03d3afd872f44c9e + - cfd65bed18a1fae631091c3a4c4dd533 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of subject process image + Sample: + - 1f912d4bec338ef10b7c9f19976286f8acc4eb97 + - ded3833f145989fd86c1f4811b61497298ebc7fd + - 9ad737cbd8bbdddc96726156dbd3bc03936bf02f + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of subject process image + Sample: + - f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881 + - 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8 + - 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: processFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the subject process + Sample: + - /usr/bin/bash + - c:\windows\system32\svchost.exe + - c:\windows\system32\lsass.exe + DL_Type: string + DL_CommonKey: + - ProcessFullPath + - ProcessName + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: processHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The FNV of subject process + Sample: + - '7114696589795796819' + - '1307755369266815004' + - '-5015325378148567246' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processName + ProductCode: + - sds + - xes + - sao + Description_EN: The image name of the process that triggered the event + Sample: + - /usr/bin/bash + - c:\windows\system32\svchost.exe + - c:\windows\system32\lsass.exe + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: false +- Name: processPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of the subject process + Sample: + - 4 + - 1 + - 784 + - 792 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUser + ProductCode: + - sds + - xes + - sao + Description_EN: The owner name of subject process image + Sample: + - root + - SYSTEM + - SISTEMA + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: dpt + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The destination port number + Sample: [] + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The destination IP address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The source port number + Sample: + - 53 + - 5353 + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The source address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: srcFilePath + ProductCode: + - xes + - sao + - sds + Description_EN: The source file path + Sample: + - \\cnva-apps\megaclockprod\traveler\travelerprint.accdb + - c:\program files\common files\microsoft + shared\clicktorun\officesvcmgrschedule.xml + - q:\a7_dbs\a4_pkg\a4_packaging.accde + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectBmData + ProductCode: + - sds + - xes + Description_EN: The data of BM event + Sample: + - '{"provider":"ORCA","schema_version":1,"data":[{"str":"Access /proc//*"}]}' + - "{\"provider\":\"ORCA\",\"schema_version\":1,\"data\":[{\"str\":\"source '/etc/profile.d/lang.sh'\"\ + }]}" + - "{\"provider\":\"ORCA\",\"schema_version\":1,\"data\":[{\"str\":\"source '/etc/profile.d/bash_completion.sh'\"\ + }]}" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osDescription + ProductCode: + - sds + - xes + - sao + Description_EN: The OS version + Sample: + - Windows 10 (64 bit) + - Windows 10 Pro (64 bit) build 19044 + - Amazon Linux 2 (64 bit) (5.4.188-104.359.amzn2.x86_64) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: instanceId + ProductCode: + - sds + - xes + Description_EN: The virtual machine instance ID on the cloud platform + Sample: + - i-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudProvider + ProductCode: + - sds + - xes + Description_EN: The service provider of the cloud asset + Sample: + - aws + - azure + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vpcId + ProductCode: + - sds + - xes + Description_EN: The virtual private cloud that contains the cloud asset + Sample: + - vpc-01234567890abcdef + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: regionId + ProductCode: + - sds + - xes + Description_EN: The cloud asset region + Sample: + - US East (N. Virginia) + - Europe (Frankfurt) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The event hash ID + Sample: + - '-8406473586387535914' + - '138486453338666581' + - '-7909265752378976284' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The first time the event was seen + Sample: + - 1656355418449 + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: lastSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The last time the event was seen + Sample: + - 1656355418449 + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: endpointMacAddress + ProductCode: + - sds + - xes + - sao + Description_EN: The host MAC address + Sample: + - 0-0-0-0-0-0-0-e0 + - 00:00:00:ff:ff:ff + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userDomain + ProductCode: + - sds + - xes + - sao + Description_EN: The user domain name + Sample: + - CORP + - AUTORIDADE NT + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: timezone + ProductCode: + - sds + - xes + - sao + Description_EN: The host time zone + Sample: + - UTC+00:00 + - UTC-05:00 + - UTC-03:00 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - xes + - sao + Description_EN: The product version + Sample: + - 1.2.0.2752 + - 1.0.345 + - 1.2.0.2657 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: plang + ProductCode: + - sds + - xes + - sao + Description_EN: The product language + Sample: + - 1 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: pplat + ProductCode: + - sds + - xes + - sao + Description_EN: The product platform + Sample: + - 5889 + - 9217 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: osName + ProductCode: + - sds + - xes + - sao + Description_EN: The host operating system name + Sample: + - Windows + - Linux + - macOS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osVer + ProductCode: + - sds + - xes + - sao + Description_EN: The version of the host operating system + Sample: + - Amazon Linux 2 + - 10.0.19044 + - 10.0.19042 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osType + ProductCode: + - sds + - xes + - sao + Description_EN: The host operating system type + Sample: + - '0x00000030' + - '4' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The session ID + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: processUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The process user domain + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time the subject process was launched + Sample: + - '1653614775212' + - '1656118626642' + - '1652098160298' + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The file hash of the process + Sample: + - '2141057820373638746' + - '-821808160829839906' + - '5222963427542927736' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSigner + ProductCode: + - xes + - sao + - sds + Description_EN: The process file signer + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + - Microsoft Corporation + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: The validity of the process signer + Sample: + - 1 + - 0 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: The file size of the process file + Sample: + - '59952' + - '59456' + - '47024' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the process file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1635172906000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the process file was modified + Sample: + - '1652131848000' + - '1633413236462' + - '1414554708877' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file type of the process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file subtype of the process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The process file owner name + Sample: + - root + - cit + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The name of the process file user group + Sample: + - wheel + - admin + - staff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The parent hash ID + Sample: + - '-865367326691173681' + - '-2903238741593506113' + - '-4358168316031740439' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentName + ProductCode: + - sds + - xes + - sao + Description_EN: The image name of the parent process + Sample: + - c:\windows\system32\services.exe + - /usr/bin/bash + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The parent session ID + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: parentUser + ProductCode: + - sds + - xes + - sao + Description_EN: The type of user that executed the parent process + Sample: + - root + - SYSTEM + - SISTEMA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The user domain of the parent process + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time when the parent process was launched + Sample: + - '1653614773895' + - '1656118625928' + - '0' + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The parent file hash ID + Sample: + - '-4092577940452904134' + - '2141057820373638746' + - '-821808160829839906' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSigner + ProductCode: + - xes + - sao + - sds + Description_EN: The signer of the parent file + Sample: + - Microsoft Windows Publisher + - Microsoft Windows + - Software Signing;Apple Code Signing Certification Authority;Apple Root CA; + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: The validity of the parent signer + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: The file size of the parent file + Sample: + - '714856' + - '59952' + - '5114880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the parent file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1635172968000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the parent file was modified + Sample: + - '1652131848000' + - '1577865600000' + - '1635172968000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file type of the parent file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file subtype of the parent file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The owner name of the parent file + Sample: + - root + - cit + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The name of the parent file user group + Sample: + - wheel + - admin + - staff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The object hash ID + Sample: + - '8576474808125313522' + - '-599270888483415002' + - '2177864258235728980' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectFileSize + ProductCode: + - xes + - sao + - sds + - ddr + Description_EN: The file size of the object file + Sample: + - 0 + - 59456 + - 60 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectCurrentFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: Previous size of modified object file + Sample: + - 0 + - 59456 + - 60 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the object file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1648279273000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the object file was modified + Sample: + - '1652131848000' + - '1577865600000' + - '1648279273000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The object file owner name + Sample: + - root + - NT SERVICE\TrustedInstaller + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The object file user group name + Sample: + - wheel + - staff + - admin + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileIsRemoteAccess + ProductCode: + - sao + - xes + - sds + Description_EN: The remote access to the object file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFirstSeen + ProductCode: + - xes + - sds + - sao + Description_EN: The first time the object was seen + Sample: + - '1656458063638' + - '1656260547165' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLastSeen + ProductCode: + - xes + - sds + - sao + Description_EN: The last time the object was seen + Sample: + - '1656458354730' + - '1656260580722' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashId + ProductCode: + - xes + - sao + - sds + Description_EN: The source file hash ID + Sample: + - '1102079405020678318' + - '-6926286289273504319' + - '8528955148329941480' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcFileSize + ProductCode: + - xes + - sao + - sds + - ddr + Description_EN: The file size of the source file + Sample: + - '0' + - '131072' + - '196608' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the source file was created + Sample: + - '1577865600000' + - '1626201752000' + - '1626201750000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the source file was modified + Sample: + - '1626201752000' + - '1626201750000' + - '1577865600000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: The true file type of the source file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcSubTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: The true file subtype of the source file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The source file owner name + Sample: + - root + - NT SERVICE\TrustedInstaller + - NT AUTHORITY\SYSTEM + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The source file user group name + Sample: + - wheel + - staff + - NT SERVICE\TrustedInstaller + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileIsRemoteAccess + ProductCode: + - xes + - sao + - sds + Description_EN: The remote access of the source file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFirstSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The first time the source file was seen + Sample: + - '0' + - '1656355418449' + - '1656714760440' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcLastSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The last time the source file was seen + Sample: + - '0' + - '1656355418449' + - '1656715147313' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The object file hash ID + Sample: + - '2141057820373638746' + - '-6516669617381620295' + - '-4912169863817247597' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectName + ProductCode: + - sds + - xes + - sao + Description_EN: The object name + Sample: + - /usr/bin/bash + - /bin/bash + - /opt/folder1/probes/system/processes/processes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The object session ID + Sample: + - '0' + - '1' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The object launch time of the Windows event + Sample: + - '1616412892557' + - '1620778597056' + - '1616414113105' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The object user domain + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectUserGroup + ProductCode: + - xes + - sao + - sds + Description_EN: The user group name + Sample: + - staff + - _spotlight + - wheel + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The source hash ID + Sample: + - '4070054759888344851' + - '2177864258235728980' + - '3476454206648023552' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: proto + ProductCode: + - sds + - xes + - sao + Description_EN: The protocol type + Sample: + - TELEMETRY_CONNECTION_TCP + - TELEMETRY_CONNECTION_UDP + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectContentName + ProductCode: + - xes + - sds + - sao + Description_EN: The AMSI object content name + Sample: + - C:\Program + Files\WindowsPowerShell\Modules\PowerShellGet\1.2\PowerShellGet.psd1 + - c:\synclog\BLAST_SCAN.vbs + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRawDataSize + ProductCode: + - xes + - sds + - sao + Description_EN: The raw data size of the Windows event object + Sample: + - '9' + - '1' + - '564' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRunAsLocalAccount + ProductCode: + - sds + - xes + - sao + Description_EN: The "runas" command uses a local account + Sample: + - 0 + - 1 + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryRoot + ProductCode: + - xes + - sds + - sao + Description_EN: The Windows Registry Root ID + Sample: + - '3' + - '1' + - '2' + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectRegType + ProductCode: + - sds + - xes + - sao + Description_EN: The Windows Registry Type ID + Sample: + - 1 + - 11 + - 4 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectPosixPermission + ProductCode: + - sds + Description_EN: The current POSIX permission for the file + Sample: + - 0x100600 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectCurrentPosixPermission + ProductCode: + - sds + Description_EN: The new POSIX permission file used in file events and CHMOD + events + Sample: + - 0x100644 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectPosixPermissionHashId + ProductCode: + - sds + Description_EN: The POSIX permission hash ID + Sample: + - -8931783023607715387 + DL_Type: string + DL_Searchable: true +- Name: parentFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the parent image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: processFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the process image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the object image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: requestMethod + ProductCode: + - sao + - xes + - sds + Description_EN: The network protocol request method + Sample: + - GET + - POST + - PUT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: status + ProductCode: + - sao + - xes + - sds + Description_EN: The HTTP response status code + Sample: + - 200 + - 500 + - 403 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: customAssetTags + ProductCode: + - xes + - sds + - sao + Description_EN: The list of custom asset tags + Sample: + - '{"os":["linux", "windows"], "org":["bu1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: platformAssetTags + ProductCode: + - xes + - sds + - sao + Description_EN: The list of platform custom asset tags + Sample: + - '{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Endpoint/Trend Micro Apex One On-Premises.yaml b/doc_v2/Endpoint/Trend Micro Apex One On-Premises.yaml new file mode 100644 index 0000000..4725828 --- /dev/null +++ b/doc_v2/Endpoint/Trend Micro Apex One On-Premises.yaml @@ -0,0 +1,165 @@ +- Name: parentSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFilePath + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The file path of the quarantined object + Sample: + - C:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileId + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The unique identifier of the quarantined object + Sample: + - ASLUMVS0.4FC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileSha256 + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The SHA-256 of the quarantined object + Sample: + - 84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: detectionNames + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The rules that triggered the event + Sample: + - [HS_EMOTET.SMAA, HM_AVEDOWN.SMZTIG-A, HE_DOCQRPHISH.SM] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: detectionMeta + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The descriptions of the detected techniques + Sample: + - [T1204 some description about this technique, T1573.001_AES another + description about this technique] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Endpoint/Trend Micro Apex One as a Service.yaml b/doc_v2/Endpoint/Trend Micro Apex One as a Service.yaml new file mode 100644 index 0000000..39aca9c --- /dev/null +++ b/doc_v2/Endpoint/Trend Micro Apex One as a Service.yaml @@ -0,0 +1,6137 @@ +- Name: interestedHost + ProductCode: + - sds + - pdi + - xns + - pds + - sao + Description_EN: The endpoint hostname (For example, if an intranet host + accesses a suspicious internet host, the intranet host is the "peerHost" and + the internet host is the "interestedHost") + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - es-dtc-w-dc02.example.corp + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: userDomain + ProductCode: + - sao + - sws + - sig + Description_EN: The user domain + Sample: + - example.com.pa + - DOMAIN + DL_Type: string + DL_CommonKey: + - EndpointName + - DomainName + - AccountDomain + DL_Searchable: true + DL_Aggregable: false +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: interestedIp + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - ptn + Description_EN: The IP of the interestedHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: endpointIp + ProductCode: + - sds + - pds + - sao + - ptp + - stp + - ptn + - sss + - ddr + Description_EN: The IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: peerIp + ProductCode: + - pdi + - xns + - sao + Description_EN: The IP of peerHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: objectFileName + ProductCode: + - sao + - scs + - sds + Description_EN: The object file name + Sample: + - powershell.exe + - wmiprvse.exe + - dismhost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileName + ProductCode: + - pdi + - xns + - sao + - sfs + - sfc + - sds + - sss + - scs + Description_EN: The file name of the compressed file + Sample: + - /proc/32058/fd/150 + - NONAMEFL + - /proc/10006/fd/30 + - VirusActionSample/RPF2_OtherMalwareSample-other.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: filePath + ProductCode: + - sds + - pds + - sao + - pdi + - xns + - pts + - sfs + - sfc + Description_EN: The file path without the file name + Sample: + - security + - /var/log/audit/audit.log + - application + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: objectFilePath + ProductCode: + - sao + - sds + - xes + - scs + Description_EN: The file path of the target process image or target file + Sample: + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - zwwritevirtualmemory + - c:\windows\system32\wbem\wmiprvse.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: forensicFilePath + ProductCode: + - sao + Description_EN: The file path of the forensic file (When a Data Loss + Prevention policy is triggered, the file is encrypted and copied to the + OfficeScan server for post-mortem analysis) + Sample: + - C:\Program Files (x86)\Trend Micro\OfficeScan + Client\dlplite\forensic\frnsc_200411DC0594_xml_00000000000_20220314_132326281 + - C:\Program Files (x86)\Trend Micro\OfficeScan + Client\dlplite\forensic\frnsc_CIL-OPRCOGEN_docx_00000000000_20211025_225445873 + - C:\Program Files (x86)\Trend Micro\OfficeScan + Client\dlplite\forensic\frnsc_SHA-ESHOU_h265_00000000000_20220601_082417865 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileHash + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-1 of the decompressed archive + Sample: + - 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA + - FA71B59F35F0EE44D27F74917EF5A0DA2797E80B + - 14D2302172EB81465CE12E01361AE24CDE170F7B + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha1 + ProductCode: + - sao + - xes + - sds + Description_EN: The SHA-1 of the objectFilePath object + Sample: + - 51B8646308EE0B68AD1F7F1291B85395434DE49A + - 36C5D12033B2EAF251BAE61C00690FFB17FDDC87 + - 2586528000199793730B05D3F169BCF139E4D7A1 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHashSha256 + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-256 of the compressed suspicious file + Sample: + - 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F + - 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE + - 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha256 + ProductCode: + - sao + - xes + - sds + Description_EN: The SHA-256 of the object (objectFilePath) + Sample: + - A75C85F3B089993E9C042FB82ECB7757E8F460ED8065FC7991CAA38A6DE0F50C + - 908B64B1971A979C7E3E8CE4621945CBA84854CB98D76367B791A6E22B5F6D53 + - 1A2ABAAD8A166B66CA35AB51C7432C5A7E46996472C8174281842896408D7F96 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashMd5 + ProductCode: + - sao + - xes + - sds + Description_EN: The MD5 of the object + Sample: + - 801E8003C257C8F540B20F1E0DECD3A6 + - CDA48FC75952AD12D99E526D0B6BF70A + - D5120786925038601A77C2E1EB9A3A0A + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: processCmd + ProductCode: + - sds + - xes + - pds + - sao + - scs + Description_EN: The subject process command line + Sample: + - '"C:\Program Files (x86)\AADM\AADM.exe" ' + - /usr/lib/inet/sendmail -bl -q15m + - ComDir + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectCmd + ProductCode: + - sao + - sds + - xes + Description_EN: The object process command line + Sample: + - C:\WINDOWS\system32\wbem\wmiprvse.exe -Embedding + - "\"C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe\" -NoLogo -Noninteractive + -NoProfile -ExecutionPolicy Bypass \"& 'C:\\WINDOWS\\CCM\\SystemTemp\\afd6f0e5-e491-4764-a20a-9f1d9edf3cce.ps1'\"" + - C:\WINDOWS\system32\lsass.exe + DL_Type: dynamic + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryData + ProductCode: + - xes + - sao + - sds + Description_EN: The registry data contents + Sample: + - C:\Program Files\AlertMedia\AlertMedia Desktop Notifications\AlertMedia.exe + DL_Type: string + DL_CommonKey: + - RegistryValueData + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryKeyHandle + ProductCode: + - xes + - sds + - sao + Description_EN: The registry key path + Sample: + - HKCR\CID\{00000000-0000-0000-0000-000000000001} + - HKLM\SOFTWARE\WOW6432Node\Eos + - HKCU\SOFTWARE\Cerner\InstantAccess + DL_Type: string + DL_CommonKey: + - RegistryKey + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryValue + ProductCode: + - xes + - sao + - sds + Description_EN: The registry value name + Sample: + - '1' + - key + - reg + DL_Type: string + DL_CommonKey: + - RegistryValue + DL_Searchable: true + DL_Aggregable: false +- Name: objectType + ProductCode: + - sca + - sds + - sao + - sem + - xes + - sfs + Description_EN: The object type + Sample: + - file + - process + - qil + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFilePath + ProductCode: + - sao + - sds + - xes + Description_EN: The file path of the subject process + Sample: + - c:\windows\system32\svchost.exe + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - c:\windows\syswow64\srts\wmipr.exe + DL_Type: string + DL_CommonKey: + - ProcessFullPath + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: suser + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email sender + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: duser + ProductCode: + - sds + - pds + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email recipient + Sample: + - (no user) + - SYSTEM + - ' SYSTEM' + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: true +- Name: mailMsgSubject + ProductCode: + - sca + - pdi + - xns + - sem + - sao + - xms + Description_EN: The email subject + Sample: + - FW. mail subject + - ManageEngine + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: true +- Name: msgId + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The internet message ID + Sample: + - 66.6.00.0006 + - example.test.com + - dameware1svr + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: false +- Name: tags + ProductCode: + - ALL + - sds + - sao + - pdi + - xns + Description_EN: The detected technique ID based on the alert filter + Sample: + - MITREV9.T1090 + - MITRE.T1071 + - MITREV9.T1059.001 + DL_Type: dynamic + DL_CommonKey: + - Technique + - Tactic + DL_Searchable: true + DL_Aggregable: true +- Name: tacticId + ProductCode: + - pdi + - xns + - xes + - sao + Description_EN: The list of MITRE tactic IDs + Sample: + - TA0011 + - TA0008 + - TA0001 + DL_Type: dynamic + DL_CommonKey: + - Tactic + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleId + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - mns + Description_EN: The rule ID + Sample: + - 1002795 + - 1003802 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubName + ProductCode: + - sao + - sca + - sds + - sem + - xes + - sig + - sss + Description_EN: The event type sub-name + Sample: + - IPS Detection + - Personal Firewall + - Attack Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA-1 of the subject process + Sample: + - C0885381EBAC94AB20E78936434FA208F6B65352 + - ac373ed32b491da22924e2e11e36574e5d582a35 + - DF93F7DF887E86C3B56539B5046B286001C6F150 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: policyId + ProductCode: + - ptp + - sao + - xes + - stp + - sds + - pds + - scs + Description_EN: The policy ID of which the event was detected + Sample: + - 00000001-0001-0001-0001-000000007610 + - '007' + - '003' + - TM000001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: actResult + ProductCode: + - sao + - sca + - sds + - pds + - pts + - ams + Description_EN: The result of an action + Sample: + - Dropped + - Successful + - Accepted + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malSrc + ProductCode: + - sao + - mns + Description_EN: The malware infection source + Sample: + - \\10.172.1.33\kortiz + - \\10.240.0.148\wbind + - \\10.240.1.69\MT26933059 + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: malDst + ProductCode: + - sao + Description_EN: The malware infection destination + Sample: + - 3334_02W3P7 + - 2666_02N413 + - 3334_02NHEL + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - pdi + - xns + - sao + - ptp + - xes + - stp + - sig + Description_EN: The GUID of the agent which reported the detection + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: isHidden + ProductCode: + - pdi + - xns + - sao + Description_EN: Whether the detection log generated a grey rule match + Sample: + - Yes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: domainName + ProductCode: + - pdi + - xns + - sao + - sca + Description_EN: The detected domain name + Sample: + - http://10.10.10.10 + - example.domain.com + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: httpReferer + ProductCode: + - pdi + - xns + - sds + - sao + Description_EN: The HTTP referer + Sample: + - http://172.16.58.233/ + - http://example/page1/ + - https://www.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: objectName + ProductCode: + - xes + - sds + - sao + Description_EN: The base name of the object file or process + Sample: + - net.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUser + ProductCode: + - sds + - sao + Description_EN: The user name of the process or the file creator + Sample: + - SYSTEM + - SVC_JENKINS_CODE_DEV + - NETWORK SERVICE + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - pdi + - xns + - sws + - sao + - sig + - sca + - ams + - sds + Description_EN: The requested URL category + Sample: + - Untested + - '158' + - Web Advertisement + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyName + ProductCode: + - sao + - sca + - sws + - sem + - sig + - ptn + - scs + - mns + Description_EN: The name of the triggered policy + Sample: + - Steelcase + - Cabot + - Tigre - Medium Policy + - apiPostedPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: application + ProductCode: + - sws + - sig + - szn + - sao + Description_EN: The name of the requested application + Sample: + - HyperText Transfer Protocol + - DoubleClick + - The Secure HyperText Transfer Protocol + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: behaviorCat + ProductCode: + - sao + - xes + - sds + - pds + Description_EN: The matched policy category + Sample: + - Policy Enforcement + - Grey-Detection + - Threat-Detection + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: blocking + ProductCode: + - sao + Description_EN: The blocking type + Sample: + - Web reputation + - Web Server + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cat + ProductCode: + - sds + - pds + - sao + Description_EN: The weighted priority of the incident + Sample: + - 100 + - 200 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: cccaDetection + ProductCode: + - sao + - pdi + - xns + Description_EN: Is this log identified as a C&C callback address detection + Sample: + - Yes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDetectionSource + ProductCode: + - sao + - pdi + - xns + Description_EN: Which list defines this CCCA detection rule + Sample: + - CCCA_GLOBAL_LIST (0) + - GLOBAL_INTELLIGENCE + - USER_DEFINED + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaRiskLevel + ProductCode: + - sao + - pdi + - xns + Description_EN: The severity level of the threat actors associated with the + C&C servers + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionName + ProductCode: + - sao + - ams + Description_EN: The general name for the detection + Sample: + - Troj.Win32.TRX.XXPE50F13017 + - Troj.Win32.TRX.XXPE50FFF059 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: direction + ProductCode: + - sao + - ptn + Description_EN: The direction + Sample: + - Incoming + - Outgoing + - Unknown + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dmac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The MAC address of the destination IP (dest_ip) + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dvchost + ProductCode: + - sao + - pdi + - xns + Description_EN: The computer which installed the Trend Micro product + Sample: + - CU-PRO1-9039-2 + - LTPF32PMNN + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointMacAddress + ProductCode: + - sao + - ptn + - pts + Description_EN: The MAC address of endpoint + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: engineOperation + ProductCode: + - sao + - xes + Description_EN: The operation of the engine event + Sample: + - Set Key + - Invoke API + - Create + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: engType + ProductCode: + - sao + - sfs + Description_EN: The engine type + Sample: + - Virus Scan Engine (Windows XP/Server 2003, x64) + - Virus Scan NT Kernel Engine + - Spyware/Grayware Scan Engine v.6 (64-bit) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: engVer + ProductCode: + - xes + - sca + - sao + - sfs + Description_EN: The engine version + Sample: + - 1.0.0.1123_1.0.0.1101 + - 9.0.1004 + - 22.540.1001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileSize + ProductCode: + - pdi + - xns + - sig + - sao + - sfs + - sfc + - sss + Description_EN: The file size of the suspicious file + Sample: + - '0' + - '1255856' + - '1237880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: filterName + ProductCode: + - sca + - sem + - sao + - ptn + Description_EN: The filter name + Sample: + - ConnectionFilter + - Virtual Analyzer + - Data Loss Prevention + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: filterType + ProductCode: + - sao + - ptn + Description_EN: The filter type + Sample: + - Spam filter + - Size filter + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstAct + ProductCode: + - sds + - sao + - pds + Description_EN: The first scan action + Sample: + - Pass + - Quarantine + - Clean + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstActResult + ProductCode: + - sds + - sao + - pds + Description_EN: The first scan action result + Sample: + - File passed + - Unable to quarantine file + - File quarantined + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: interestedMacAddress + ProductCode: + - sao + - pdi + - xns + - ptn + Description_EN: The MAC address identified as the log owner's + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mDevice + ProductCode: + - sao + Description_EN: IP of the source + Sample: + - 10.10.10.10 + - fe80::1234:5678:9abc:def0 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mDeviceGUID + ProductCode: + - sds + - sao + - pds + Description_EN: The GUID of the agent host + Sample: + - C5B09EDD-C725-907F-29D9-B8C30D18C48F + - C05B75AB-B518-BDD0-D2B5-E9CB631C539F + - 9C28ACD3-D0EC-22A4-B08D-5B0BEFF501FC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mailDeliveryTime + ProductCode: + - sao + Description_EN: The mail delivery time + Sample: + - '1900-1-1 00:00:00' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malFamily + ProductCode: + - pdi + - xns + - sao + - sds + - sfs + Description_EN: The threat family + Sample: + - EQUATED + - STARTER + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malSubType + ProductCode: + - sao + - sfs + Description_EN: The subsidiary virus type + Sample: + - Unknown + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malType + ProductCode: + - pdi + - xns + - sds + - sao + - pds + - sfs + - scs + Description_EN: The risk type for Network Content Correlation Engine rules + Sample: + - OTHERS + - MALWARE + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpname + ProductCode: + - sds + - sao + - pds + - ptp + - xes + - stp + Description_EN: The management product name + Sample: + - Cloud One - Workload Security + - Apex Central + - Deep Security Software + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpver + ProductCode: + - sds + - pds + - sao + - xes + Description_EN: The product version + Sample: + - Microsoft-Windows-Security-Auditing + - Level -- Medium security + - TASK1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: msgAct + ProductCode: + - sao + Description_EN: The message action + Sample: + - Quarantine + - Deliver + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCreation + ProductCode: + - sao + - sds + Description_EN: The UTC time that the object was created + Sample: + - '2014-11-22T01:45:51-06:00' + - '2009-07-13T23:31:13-05:00' + - '2014-11-21T02:43:28-05:00' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileModified + ProductCode: + - sao + - sds + Description_EN: The UTC time that the object was modified + Sample: + - '2024-10-10T10:10:10.0000000Z' + - '2024-11-11T11:11:11.0000000Z' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFirstRecorded + ProductCode: + - sao + Description_EN: The first time that the object appeared + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectId + ProductCode: + - sao + - szn + Description_EN: The UUID of the object + Sample: + - '3' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectEntityName + ProductCode: + - sao + Description_EN: The object entity name + Sample: + - any_process + - exe_file + - powershell + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectPid + ProductCode: + - sao + - sds + - xes + Description_EN: The object process PID + Sample: + - 0 + - 17000 + - 22000 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectSigner + ProductCode: + - sao + - xes + Description_EN: The list of object process signers + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + - SecureWorks Inc + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUser + ProductCode: + - sao + - sds + Description_EN: The owner name of the target process or the login user name + Sample: + - Système + - SYSTEM + - SISTEMA + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: objectUserDomain + ProductCode: + - sds + - sao + Description_EN: The owner domain of the target process + Sample: + - NT AUTHORITY + - UNEB + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pComp + ProductCode: + - pdi + - xns + - sao + Description_EN: The component that made the detection + Sample: + - CAV + - NCIE + - TMUFE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: patType + ProductCode: + - sao + Description_EN: The pattern type + Sample: + - NCIE CNC Pattern + - NCIE RR Pattern + - NCIE User Define Block List + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: patVer + ProductCode: + - sao + - xes + - sca + Description_EN: The version of the behavior pattern + Sample: + - 35.1053.00 + - '630' + - 35.1071.00 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processName + ProductCode: + - sds + - xes + - pds + - scs + - sao + Description_EN: The image name of the process that triggered the event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineType + ProductCode: + - sao + Description_EN: The descriptive name for the quarantine area + Sample: + - '0' + - '1' + - '538' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rating + ProductCode: + - sao + - pdi + - xns + Description_EN: The credibility level + Sample: + - Safe + - Unknown + - Dangerous + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestClientApplication + ProductCode: + - pdi + - xns + - sds + - sao + Description_EN: The protocol user agent information + Sample: + - Microsoft-Delivery-Optimization/10.0 + - Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) + - example Software GmbH + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskConfidenceLevel + ProductCode: + - sao + - sca + Description_EN: The risk confidence level + Sample: + - '0' + - '1' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskLevel + ProductCode: + - sds + - sao + - sca + - xes + - pdi + - xns + Description_EN: The risk level + Sample: + - '1' + - high + - No Risk + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: operationLevel + ProductCode: + - sao + Description_EN: The level that is used to indicate the handler layer at SOC + Sample: + - 1 + - 3 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtDate + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The date of the log generation + Sample: + - 1655337600000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rtHour + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The hour of the log generation + Sample: + - 9 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtWeekDay + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The weekday of the log generation + Sample: + - Monday + - Tuesday + - Friday + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleType + ProductCode: + - sds + - sao + - sca + - szn + Description_EN: The access rule type + Sample: + - udso + - point of entry + - unknown + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: score + ProductCode: + - pdi + - xns + - sao + - sca + - ams + - sds + Description_EN: The Web Reputation Services URL rating + Sample: + - 71 + - 81 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: secondAct + ProductCode: + - sds + - sao + - pds + Description_EN: The second scan action + Sample: + - Unknown + - N/A + - Deny Access + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: secondActResult + ProductCode: + - sds + - sao + - pds + Description_EN: The result of the second scan action + Sample: + - Unknown + - N/A + - Access denied + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: senderGUID + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The sender GUID + Sample: + - 346648FC-9862-D2F0-F94C-FAB1A838ABD7 + - 36E5239E-EEBA-0100-C10E-C057E0455E1D + - 9606BBD5-38A7-9024-83C8-9C88A2AF90CC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: senderIp + ProductCode: + - pdi + - xns + - sao + - sem + Description_EN: The sender IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: smac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The source MAC address + Sample: + - 00:11:22:33:44:55 + - 66:77:88:99:AA:BB + - CC:DD:EE:FF:00:11 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: threatName + ProductCode: + - sca + - sao + - pdi + - xns + Description_EN: The threat name + Sample: + - Malicious_CnC_access_on_UDP_blocked + - Malicious_CnC_access_on_TCP_blocked + - Other protected file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: threatType + ProductCode: + - pdi + - xns + - sao + - sss + Description_EN: The log threat type + Sample: + - '2' + - '99' + - '5' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: bmGroup + ProductCode: + - sao + Description_EN: The one-to-many data structure + Sample: + - logGenLocalDatetime:2022-07-08T09:21:11+00:00, act:Assessment, + behaviorType:Registry, riskConfidenceLevel:1, ruleId:7, ruleName:New + Service, behaviorCategory:Policy Enforcement, + processFilePath:C:\Windows\SysWOW64\srts\wmipr.exe, aegisOperation:Set Key, + objectFilePath:HKLM\SYSTEM\CurrentControlSet\Services\DpsiBSvc\Start, + policyId:007, objectFileHashSha1:null, objectCmd:null, + processFileHashSha1:null, processCmd:null, objectRegistryData:null, + objectRegistryKeyHandle:null, objectRegistryValue:null + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyTemplate + ProductCode: + - sao + - sca + - sig + Description_EN: The one-to-many data structure + Sample: + - policyName:Monitoreo All Files, template:Managed - All files + - policyName:HSS DLP, template:All File Extension + - 'India: Mobile Numbers' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: computerDomain + ProductCode: + - sao + Description_EN: The computer domain + Sample: + - COMCEL_DOMINIO + - HDWA + - RANDON + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: destinationPath + ProductCode: + - sao + Description_EN: The intended destination of the file containing the digital + asset or channel + Sample: + - Cloud Storage (OneDrive) + - Printer + - example.sharepoint.com/personal/page_path/onedrive.aspx + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: matchedContent + ProductCode: + - sao + Description_EN: The one-to-many data structure + Sample: + - ['matchedContentEx:client_id=00000000-0000-0000-0000-000000000000&redirect_uri=https://example.page.com, + matchedInfo:0,6|0,6'] + - ['matchedContentEx:example string, matchedInfo:0,6'] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: online + ProductCode: + - sao + Description_EN: The flag to identify whether the endpoint is online + Sample: + - Yes + - No + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ftpUser + ProductCode: + - sao + Description_EN: The FTP login user name + Sample: + - USER\TREND + - User + - ftpuser_service + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: instanceId + ProductCode: + - sao + - xes + - sds + - sss + - mns + Description_EN: The ID of the instance that indicates the meta-cloud or data + center VM + Sample: + - 52294e7b-f732-c6e9-b2c3-7a6b6f50d101 + - 00030912-c5e7-4348-9012-7c684751c531 + - 0008ae58-db0c-34ee-3e5c-5dfc9b10a739 + - i-0b22a22eec53b9321 + - /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0 + - ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: extraInfo + ProductCode: + - sao + Description_EN: The network application name + Sample: + - N/A + - Web Client Common + - DCERPC Services + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileVer + ProductCode: + - sao + Description_EN: The file version + Sample: + - 10.0.19041.1 + - 10.0.19041.1766 + - 10.0.18362.1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: signer + ProductCode: + - sao + Description_EN: The signer of the file + Sample: + - Shenzhen Smartspace Software technology Co.,Limited;Symantec Class 3 SHA256 + Code Signing CA;1429491600;1492649999 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: channel + ProductCode: + - sao + Description_EN: The channel through which the demanded WinEvent is delivered + Sample: + - Local file or network drive + - Local file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileDesc + ProductCode: + - sao + - scs + Description_EN: The file description + Sample: + - Atualiza PJRO + - Carpeta de archivos + - 7z Setup SFX (x86) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileCreation + ProductCode: + - sao + Description_EN: The file creation date + Sample: + - 1595918517000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: confidence + ProductCode: + - sao + - sfs + Description_EN: The confidence rating returned from TrendX Hybrid Model + (predictive machine learning). Values from 1-99. + Sample: + - 94 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: forensicFileHash + ProductCode: + - sao + Description_EN: The hash value of the forensic data file + Sample: + - 177844c5927d0f20da06d79d986c7e7f8c7a3b6a + - da39a3ee5e6b4b0d3255bfef95601890afd80709 + - 8dab234ab6cd96301f9452994f015a449d629edd + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detailTrace + ProductCode: + - sao + Description_EN: Whether the detection comes with a detailed trace footprint + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: sourceType + ProductCode: + - sao + - scs + - xes + Description_EN: The source type + Sample: + - user defined + - sandbox + - syscall + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: parentSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of parent process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of object process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsAdhoc + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsRuntime + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsLibValid + ProductCode: + - xes + - sao + - pao + Description_EN: The list of process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vendor + ProductCode: + - sao + Description_EN: The device vendor + Sample: + - adata + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: deviceModel + ProductCode: + - sao + Description_EN: The device model number + Sample: + - c96a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: deviceSerial + ProductCode: + - sao + Description_EN: The device serial ID + Sample: + - 000000063a2e8f + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: quarantineFilePath + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The file path of the quarantined object + Sample: + - C:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: clientStatus + ProductCode: + - sao + Description_EN: The client status when the event occurred + Sample: + - Rebuilding database + - Online + - Offline + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: dacDeviceType + ProductCode: + - sao + Description_EN: The device type + Sample: + - USB storage device + - Mobile devices + - Floppy disks + - Network driver + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: accessPermission + ProductCode: + - sao + Description_EN: The access permission type + Sample: + - Modify + - Read and execute + - List device content only + - Block + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processArtifactIds + ProductCode: + - xes + - sds + - sao + Description_EN: The artifact IDs generated by processAction + Sample: + - 00000000-0000-0000-0000-000000000000_1.dmp + - 11111111-1111-1111-1111-111111111111_2.bak + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectArtifactIds + ProductCode: + - xes + - sds + - sao + Description_EN: The artifact IDs generated by objectAction + Sample: + - 00000000-0000-0000-0000-000000000000_0.dmp + - 11111111-1111-1111-1111-111111111111_2.bak + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: censusMaturityValue + ProductCode: + - sds + - sao + Description_EN: The CENSUS maturity value + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: censusPrevalenceValue + ProductCode: + - sds + - sao + Description_EN: The CENSUS prevalence value + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dceArtifactActions + ProductCode: + - sds + - sao + Description_EN: The actions performed on Damage Cleanup Engine artifacts + Sample: + - folder_backup + - objproc_dump + - subproc_dump + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: detectedBackupFolder + ProductCode: + - sds + - sao + - xes + Description_EN: The folder path for detected backup folders + Sample: + - C:\\Program Files (x86)\\Trend Micro\\artifact\\DCE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectedBackupArtifacts + ProductCode: + - sds + - sao + Description_EN: The information about detected artifacts + Sample: + - '{"objectArtifactId": "025d9f2a-ac9c-4cdf-b9e4-cf20c6e40281_0.dmp", "action": + "object_process_dump", "status": 0, "processCreationTime": "1627574338077", "processImageFileName": + "C:\Program Files\aaa\bbb\objprocess.exe"}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionEngineVersion + ProductCode: + - sds + - sao + Description_EN: The detection engine version + Sample: + - 7.6.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectedPattern + ProductCode: + - sds + - sao + Description_EN: The detected pattern + Sample: + - dct.virus + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: isProxy + ProductCode: + - sds + - sao + Description_EN: Whether something is a proxy + Sample: + - false + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: moduleScanType + ProductCode: + - sds + - sao + Description_EN: The module scan type + Sample: + - traditional + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: objectAttributes + ProductCode: + - sds + - sao + Description_EN: The object attributes + Sample: + - attribute + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileAccess + ProductCode: + - sds + - sao + Description_EN: The object file access details + Sample: + - 1717658631000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: originalFileHashes + ProductCode: + - sds + - sao + Description_EN: The hashes of the original file + Sample: + - ba4700bfd55741c657a99fbe416787835fb384da + - 639dfe4a69c1e6aace1e4eece3b3bb25af6a1392 + DL_Type: dynamic + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: originalFilePaths + ProductCode: + - sds + - sao + Description_EN: The paths of the original file + Sample: + - C:\\Users\\user_name\\Downloads\\run.exe + DL_Type: dynamic + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: trigger + ProductCode: + - sds + - sao + Description_EN: The action trigger + Sample: + - ATSE + - On-demand scan + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: detectedActions + ProductCode: + - sds + - sao + Description_EN: The actions performed on detected artifacts + Sample: + - folder_backup + - objproc_dump + - subproc_dump + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processImageFileNames + ProductCode: + - sds + - sao + Description_EN: The process image file names of detected backup artifacts + Sample: + - C:\Program Files\aaa\bbb\objprocess.exe + - C:\Program Files\ccc\ddd\sample.exe + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionAggressivenessLevel + ProductCode: + - xes + - sao + - sds + Description_EN: The detection aggressiveness level + Sample: + - 1 + - 2 + - 3 + - 4 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: detectedBackupArtifactsStatus + ProductCode: + - sds + - sao + Description_EN: The backup status of detected artifacts + Sample: + - ['0', '-67'] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: triggerReason + ProductCode: + - xes + - sao + - sds + Description_EN: The cause of the triggered action + Sample: + - FILEMETA.T1027.009.TRICKBOT.SMITRE1B2, T1027.009 + - ST002 + - Scheduled Scan (custom) + - Scheduled Scan (system) + - 'Remote Scan: the user triggered the Apex One agent from the Trend Vision One + console' + - 'Manual Scan: the user triggered the local agent' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: customAssetTags + ProductCode: + - xes + - sds + - sao + - scs + Description_EN: The list of custom asset tags + Sample: + - '{"os":["linux", "windows"], "org":["bu1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: platformAssetTags + ProductCode: + - xes + - sds + - sao + - scs + Description_EN: The list of platform custom asset tags + Sample: + - '{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionAggregationIds + ProductCode: + - sao + - sds + Description_EN: The list of detection aggregation IDs + Sample: + - [11111111-1111-1111-1111-111111111111] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: triggerInfo + ProductCode: + - sao + - sds + Description_EN: The trigger information + Sample: + - [{triggerModule: ODS, triggerReason: System Schedule Scan}] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileId + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The unique identifier of the quarantined object + Sample: + - ASLUMVS0.4FC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileSha256 + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The SHA-256 of the quarantined object + Sample: + - 84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: detectionNames + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The rules that triggered the event + Sample: + - [HS_EMOTET.SMAA, HM_AVEDOWN.SMZTIG-A, HE_DOCQRPHISH.SM] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: detectionMeta + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The descriptions of the detected techniques + Sample: + - [T1204 some description about this technique, T1573.001_AES another + description about this technique] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: endpointGuid + ProductCode: + - sds + - xes + - sao + Description_EN: Host GUID of the endpoint on which the event was detected + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: endpointHostName + ProductCode: + - sds + - xes + - sao + Description_EN: The host name of the endpoint on which the event was detected + Sample: + - PHILIPSIBE09 + - WHAM6WK8XG2 + - MacBook-Pro-del-Meno + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointIp + ProductCode: + - sds + - xes + - sao + Description_EN: IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + - ::1 + - fe80::1 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: eventId + ProductCode: + - sds + - xes + - sao + Description_EN: Event type + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubId + ProductCode: + - sds + - xes + - sao + Description_EN: The access type + Sample: + - 2 - TELEMETRY_PROCESS_CREATE + - 101 - TELEMETRY_FILE_CREATE + - 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time the agent detected the event + Sample: + - 1657781088000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hostName + ProductCode: + - xes + - sds + - sao + Description_EN: The domain name + Sample: + - localhost + - wpad + - settings-win.data.microsoft.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: integrityLevel + ProductCode: + - xes + - sao + Description_EN: The integrity level of a process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logonUser + ProductCode: + - sds + - xes + - sao + Description_EN: The logon user name + Sample: + - root + - SISTEMA + - oracle + DL_Type: dynamic + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppName + ProductCode: + - xes + - sds + - sao + Description_EN: Name of the app involved in the AMSI event + Sample: + - Exchange Server 2016 + - PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.19041.1 + - PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.14393.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectCmd + ProductCode: + - sds + - xes + - sao + Description_EN: Command line entry of target process + Sample: + - wc -l + - runc init + - docker-init --version + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The md5 hash of target process image or target file + Sample: + - 7ac47235c7bb452a03d3afd872f44c9e + - c9873d83a969645a97f21adc1b164cc5 + - 3b32b378c8b288de6f15e1607a8c2145 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of target process image or target file + Sample: + - ded3833f145989fd86c1f4811b61497298ebc7fd + - c4fa06404142f1994431f9eef3df2cbe0f1998f1 + - 3c01d486ed5aa1ecc2d8f33dc24b0ed59b3e609e + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of target process image or target file + Sample: + - 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8 + - 49fa3e206abf6a1f4546417dbe09f3f06b38847866a4a66de75bd90f39cb6c1c + - 0969321ad5a0923f0f03896ad2c10e49290515c44b721d773942a37f62a24893 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the target process image or target file + Sample: + - /usr/bin/bash + - /bin/bash + - /opt/folder1/probes/system/processes/processes + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectHostName + ProductCode: + - sao + - xes + Description_EN: Server name where Internet event was detected + Sample: + - 10.10.10.10 + - sample.test.org + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: true +- Name: httpReferer + ProductCode: + - sao + - xes + Description_EN: The HTTP header referer + Sample: + - http://10.10.10.10/ + - http://fake/home/ + - http://fake.com/page/Test.jsp + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: objectIntegrityLevel + ProductCode: + - xes + - sao + Description_EN: Integrity level of target process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectIp + ProductCode: + - sao + - xes + Description_EN: IP address of internet event + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: objectIps + ProductCode: + - xes + - sds + - sao + Description_EN: IP address list of internet event + Sample: + - ::1 + - 10.10.10.10 + - ::ffff:10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: objectPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of target process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectPort + ProductCode: + - sao + - xes + Description_EN: The port number used by internet event + Sample: [] + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: objectProcessHashId + ProductCode: + - sao + - xes + - sds + Description_EN: FNV of target process + Sample: + - '1415699552492662761' + - '-100650285065767982' + - '-1139416698673814436' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRawDataStr + ProductCode: + - xes + - sds + - sao + Description_EN: The data contents of the AMSI event + Sample: + - $global:? + - '0' + - "$servicename = \"WinRM\"\n$arrService = Get-Service $servicename\n\nif ($arrService.Status + -ne \"Running\")\n\n{\n\n\tRestart-Service $servicename\n\n\n}\n" + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryData + ProductCode: + - xes + - sds + - sao + Description_EN: The registry value data + Sample: + - '{11111111-1111-1111-1111-111111111111}' + - '1' + - '0' + DL_Type: string + DL_CommonKey: + - RegistryValueData + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryKeyHandle + ProductCode: + - xes + - sds + - sao + Description_EN: The registry key + Sample: + - HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters + - HKLM\system\currentcontrolset\services\w32time\config + - HKLM\system\currentcontrolset\services\tcpip\parameters + DL_Type: string + DL_CommonKey: + - RegistryKey + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryValue + ProductCode: + - sds + - xes + - sao + Description_EN: Registry value name + Sample: + - lastknowngoodtime + - threadingmodel + - epoch + DL_Type: string + DL_CommonKey: + - RegistryValue + DL_Searchable: true + DL_Aggregable: false +- Name: objectSigner + ProductCode: + - xes + - sao + - sds + Description_EN: Certificate signer of object process or file + Sample: + - Microsoft Windows + - Software Signing;Apple Code Signing Certification Authority;Apple Root CA; + - Microsoft Corporation + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: Validity of certificate signer + Sample: + - 1 + - 0 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsAdhoc + ProductCode: + - xes + - sao + Description_EN: The list of object process or file signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsRuntime + ProductCode: + - xes + - sao + Description_EN: The list of object process or file signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSignerFlagsLibValid + ProductCode: + - xes + - sao + Description_EN: The list of object process or file signature library + validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileExtendedAttribute + ProductCode: + - xes + - sao + Description_EN: The extended attributes of the file + Sample: + - com.apple.quarantine + - com.apple.metadata:kMDItemWhereFroms + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: File object's true sub-type + Sample: + - 0 + - 5000 + - 18000 + - 28001 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: File object's true major type + Sample: + - 7 + - 5 + - 18 + - 4051 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUser + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The owner name of the target process or the login user name + Sample: + - root + - SYSTEM + - oracle + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: parentCmd + ProductCode: + - xes + - sds + - sao + Description_EN: The command line entry of the parent process + Sample: + - C:\WINDOWS\system32\services.exe + - C:\Windows\system32\services.exe + - /sbin/launchd + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The md5 hash of parent process + Sample: + - d8e577bf078c45954f4531885478d5a9 + - cd10cb894be2128fca0bf0e2b0c27c16 + - cfd65bed18a1fae631091c3a4c4dd533 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of parent process + Sample: + - d7a213f3cfee2a8a191769eb33847953be51de54 + - 1f912d4bec338ef10b7c9f19976286f8acc4eb97 + - 9ad737cbd8bbdddc96726156dbd3bc03936bf02f + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of parent process + Sample: + - dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674 + - f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881 + - 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: parentFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the parent process + Sample: + - c:\windows\system32\services.exe + - /usr/bin/bash + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: parentPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of the parent process + Sample: + - 1 + - 976 + - 920 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - xes + - sao + Description_EN: Internal product ID (Deprecated, use productCode) + Sample: + - '2200' + - '751' + - '533' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processCmd + ProductCode: + - xes + - sds + - sao + Description_EN: The command line entry of the subject process + Sample: + - C:\Windows\system32\lsass.exe + - C:\WINDOWS\system32\lsass.exe + - nimbus(processes) + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashMd5 + ProductCode: + - sds + - xes + - sao + Description_EN: The MD5 hash of the subject process image + Sample: + - cd10cb894be2128fca0bf0e2b0c27c16 + - 7ac47235c7bb452a03d3afd872f44c9e + - cfd65bed18a1fae631091c3a4c4dd533 + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha1 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA1 hash of subject process image + Sample: + - 1f912d4bec338ef10b7c9f19976286f8acc4eb97 + - ded3833f145989fd86c1f4811b61497298ebc7fd + - 9ad737cbd8bbdddc96726156dbd3bc03936bf02f + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashSha256 + ProductCode: + - sds + - xes + - sao + Description_EN: The SHA256 hash of subject process image + Sample: + - f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881 + - 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8 + - 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: processFilePath + ProductCode: + - sds + - xes + - sao + Description_EN: The file path of the subject process + Sample: + - /usr/bin/bash + - c:\windows\system32\svchost.exe + - c:\windows\system32\lsass.exe + DL_Type: string + DL_CommonKey: + - ProcessFullPath + - ProcessName + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: processHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The FNV of subject process + Sample: + - '7114696589795796819' + - '1307755369266815004' + - '-5015325378148567246' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: processName + ProductCode: + - sds + - xes + - sao + Description_EN: The image name of the process that triggered the event + Sample: + - /usr/bin/bash + - c:\windows\system32\svchost.exe + - c:\windows\system32\lsass.exe + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: false +- Name: processPid + ProductCode: + - sds + - xes + - sao + Description_EN: The PID of the subject process + Sample: + - 4 + - 1 + - 784 + - 792 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processUser + ProductCode: + - sds + - xes + - sao + Description_EN: The owner name of subject process image + Sample: + - root + - SYSTEM + - SISTEMA + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: rawDataStr + ProductCode: + - xes + - sao + Description_EN: Windows event raw contents + Sample: + - "{\n \"EventData\" : {\n \"LogonType\" : \"\",\n \"TargetDomainName\"\ + \ : \"\",\n \"TargetLogonId\" : \"\",\n \"TargetUserName\" : \"\",\n\ + \ \"TargetUserSid\" : \"\"\n }\n}\n" + - "{\n \"EventData\" : {\n \"LogonType\" : \"10\",\n \"TargetDomainName\"\ + \ : \"AFASADV\",\n \"TargetLogonId\" : \"14941011731\",\n \"TargetUserName\"\ + \ : \"administrator\",\n \"TargetUserSid\" : \"S-1-5-21-1507008304-2416677881-2121376573-500\"\ + \n }\n}\n" + - "{\n \"EventData\" : {\n \"LogonType\" : \"10\",\n \"TargetDomainName\"\ + \ : \"AIS\",\n \"TargetLogonId\" : \"216921070\",\n \"TargetUserName\"\ + \ : \"MWoodr01\",\n \"TargetUserSid\" : \"S-1-5-21-1873864278-1756520048-3043165120-15057\"\ + \n }\n}\n" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: request + ProductCode: + - sao + - xes + Description_EN: Request URL + Sample: + - http://10.10.10.10/fake/site + - http:///fake/param.cgi?action=list&group=Alarm.Status + - http://fake.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: dpt + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The destination port number + Sample: [] + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The destination IP address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The source port number + Sample: + - 53 + - 5353 + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - sds + - xes + - sao + - ddr + Description_EN: The source address + Sample: + - '::' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: srcFileHashMd5 + ProductCode: + - sao + - xes + Description_EN: The md5 hash of source file + Sample: + - e5d5e9c1f65b8ec7aa5b7f1b1acdd731 + - a6779bf446db07e4c4ba3516b273c496 + - 4bb7334fdadc6eccb8e6ab402aae013b + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashSha1 + ProductCode: + - sao + - xes + Description_EN: The SHA1 hash of source file + Sample: + - 5d34902fecc1760138212ada36be1e742bda5e52 + - dbb14dcda6502ab1d23a7c77d405dafbcbeb439e + - 2292f8109cd756e790c068a52d50f1b0858f503b + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashSha256 + ProductCode: + - sao + - xes + Description_EN: The SHA256 hash of source file + Sample: + - 4eaa002225f4ea2dedcd19b7f1337d7c58ea7dd6d4571c12468dde95e6bcfdaf + - e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80 + - 16b20a3ad485b4fbbe3028c7e743b226db21ea93cacc8b3d7d7d4a731bf02333 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: srcFilePath + ProductCode: + - xes + - sao + - sds + Description_EN: The source file path + Sample: + - \\cnva-apps\megaclockprod\traveler\travelerprint.accdb + - c:\program files\common files\microsoft + shared\clicktorun\officesvcmgrschedule.xml + - q:\a7_dbs\a4_pkg\a4_packaging.accde + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: winEventId + ProductCode: + - xes + - sao + Description_EN: Event ID of Windows event + Sample: + - 11 + - 4624 + - 4670 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventDataIpAddress + ProductCode: + - xes + - sao + Description_EN: The IP address for Windows event 4624 which is "An account was + successfully logged on" + Sample: + - '-' + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataLogonType + ProductCode: + - xes + - sao + Description_EN: The logon type for Windows event 4624 which is "An account was + successfully logged on" + Sample: + - '3' + - '5' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataScriptBlockText + ProductCode: + - sao + Description_EN: Windows event 4104, Creating Scriptblock text + Sample: + - $global:? + - '0' + - '{ Set-StrictMode -Version 1; $_.PSMessageDetails }' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataOperation + ProductCode: + - xes + - sao + Description_EN: Windows event 11 + Sample: + - 'Start IWbemServices::ExecQuery - root\ccm : select * from SMS_Authority' + - 'Start IWbemServices::ExecQuery - root\cimv2 : select * from win32_process' + - 'Start IWbemServices::ExecQuery - root\ccm : SELECT * FROM SMS_Authority' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osDescription + ProductCode: + - sds + - xes + - sao + Description_EN: The OS version + Sample: + - Windows 10 (64 bit) + - Windows 10 Pro (64 bit) build 19044 + - Amazon Linux 2 (64 bit) (5.4.188-104.359.amzn2.x86_64) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The event hash ID + Sample: + - '-8406473586387535914' + - '138486453338666581' + - '-7909265752378976284' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The first time the event was seen + Sample: + - 1656355418449 + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: lastSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The last time the event was seen + Sample: + - 1656355418449 + DL_Type: real + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: endpointMacAddress + ProductCode: + - sds + - xes + - sao + Description_EN: The host MAC address + Sample: + - 0-0-0-0-0-0-0-e0 + - 00:00:00:ff:ff:ff + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userDomain + ProductCode: + - sds + - xes + - sao + Description_EN: The user domain name + Sample: + - CORP + - AUTORIDADE NT + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: timezone + ProductCode: + - sds + - xes + - sao + Description_EN: The host time zone + Sample: + - UTC+00:00 + - UTC-05:00 + - UTC-03:00 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - xes + - sao + Description_EN: The product version + Sample: + - 1.2.0.2752 + - 1.0.345 + - 1.2.0.2657 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: plang + ProductCode: + - sds + - xes + - sao + Description_EN: The product language + Sample: + - 1 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: pplat + ProductCode: + - sds + - xes + - sao + Description_EN: The product platform + Sample: + - 5889 + - 9217 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: osName + ProductCode: + - sds + - xes + - sao + Description_EN: The host operating system name + Sample: + - Windows + - Linux + - macOS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osVer + ProductCode: + - sds + - xes + - sao + Description_EN: The version of the host operating system + Sample: + - Amazon Linux 2 + - 10.0.19044 + - 10.0.19042 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osType + ProductCode: + - sds + - xes + - sao + Description_EN: The host operating system type + Sample: + - '0x00000030' + - '4' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The session ID + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: processUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The process user domain + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time the subject process was launched + Sample: + - '1653614775212' + - '1656118626642' + - '1652098160298' + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: authId + ProductCode: + - xes + - sao + Description_EN: The authorization ID + Sample: + - '999' + - '996' + - '997' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The file hash of the process + Sample: + - '2141057820373638746' + - '-821808160829839906' + - '5222963427542927736' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSigner + ProductCode: + - xes + - sao + - sds + Description_EN: The process file signer + Sample: + - Microsoft Windows + - Microsoft Windows Publisher + - Microsoft Corporation + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: The validity of the process signer + Sample: + - 1 + - 0 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsAdhoc + ProductCode: + - xes + - sao + Description_EN: The list of process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsRuntime + ProductCode: + - xes + - sao + Description_EN: The list of process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSignerFlagsLibValid + ProductCode: + - xes + - sao + Description_EN: The list of process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: The file size of the process file + Sample: + - '59952' + - '59456' + - '47024' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the process file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1635172906000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the process file was modified + Sample: + - '1652131848000' + - '1633413236462' + - '1414554708877' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file type of the process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file subtype of the process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileCurrentOwnerSid + ProductCode: + - xes + - sao + Description_EN: The owner of the process file current security identifier + Sample: + - S-1-5-18 + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileCurrentOwnerName + ProductCode: + - xes + - sao + Description_EN: The current owner name of the process file + Sample: + - NT AUTHORITY\SYSTEM + - BUILTIN\Administrators + - BUILTIN\Administradores + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileOwnerSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the process file owner + Sample: + - S-1-5-32-544 + - S-1-5-18 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The process file owner name + Sample: + - root + - cit + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileGroupSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the process file group + Sample: + - S-1-5-18 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-32-544 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The name of the process file user group + Sample: + - wheel + - admin + - staff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileSaclString + ProductCode: + - sao + - xes + Description_EN: The system access control list of the process file + Sample: + - S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD) + - S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU) + - S:NO_ACCESS_CONTROL + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileDaclString + ProductCode: + - xes + - sao + Description_EN: The discretionary access control list of the process file + Sample: + - D:(A;ID;0x1200a9;;;AC)(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;S-1-15-2-2) + - D:(A;ID;FA;;;SY) + - D:(A;ID;FA;;;BA)(A;ID;FA;;;SY) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processFileRemoteAccess + ProductCode: + - xes + - sao + Description_EN: The remote access to the process file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The parent hash ID + Sample: + - '-865367326691173681' + - '-2903238741593506113' + - '-4358168316031740439' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentName + ProductCode: + - sds + - xes + - sao + Description_EN: The image name of the parent process + Sample: + - c:\windows\system32\services.exe + - /usr/bin/bash + - c:\windows\system32\svchost.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The parent session ID + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: parentUser + ProductCode: + - sds + - xes + - sao + Description_EN: The type of user that executed the parent process + Sample: + - root + - SYSTEM + - SISTEMA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The user domain of the parent process + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The time when the parent process was launched + Sample: + - '1653614773895' + - '1656118625928' + - '0' + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentAuthId + ProductCode: + - xes + - sao + Description_EN: The parent authorization ID + Sample: + - '999' + - '996' + - '997' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentIntegrityLevel + ProductCode: + - xes + - sao + Description_EN: The integrity level of a parent + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The parent file hash ID + Sample: + - '-4092577940452904134' + - '2141057820373638746' + - '-821808160829839906' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSigner + ProductCode: + - xes + - sao + - sds + Description_EN: The signer of the parent file + Sample: + - Microsoft Windows Publisher + - Microsoft Windows + - Software Signing;Apple Code Signing Certification Authority;Apple Root CA; + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerValid + ProductCode: + - xes + - sao + - sds + Description_EN: The validity of the parent signer + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsAdhoc + ProductCode: + - xes + - sao + Description_EN: The list of parent process signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsRuntime + ProductCode: + - xes + - sao + Description_EN: The list of parent process signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSignerFlagsLibValid + ProductCode: + - xes + - sao + Description_EN: The list of parent process signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: The file size of the parent file + Sample: + - '714856' + - '59952' + - '5114880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the parent file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1635172968000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the parent file was modified + Sample: + - '1652131848000' + - '1577865600000' + - '1635172968000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file type of the parent file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentSubTrueType + ProductCode: + - xes + - sao + - sds + Description_EN: The true file subtype of the parent file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileCurrentOwnerSid + ProductCode: + - xes + - sao + Description_EN: The current security identifier owner of the parent file + Sample: + - S-1-5-32-544 + - S-1-5-18 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileCurrentOwnerName + ProductCode: + - xes + - sao + Description_EN: The current owner name of the parent file + Sample: + - NT AUTHORITY\SYSTEM + - BUILTIN\Administradores + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileOwnerSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the parent file owner + Sample: + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The owner name of the parent file + Sample: + - root + - cit + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileGroupSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the parent process file group + Sample: + - S-1-5-18 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-32-544 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The name of the parent file user group + Sample: + - wheel + - admin + - staff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileSaclString + ProductCode: + - sao + - xes + Description_EN: The system access control list of the parent file + Sample: + - S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD) + - S:NO_ACCESS_CONTROL + - S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileDaclString + ProductCode: + - xes + - sao + Description_EN: The discretionary access control list of the parent file + Sample: + - D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2) + - D:(A;OICI;GA;;;SY)(A;OICI;0xa0120000;;;WD)(A;OICI;GA;;;BA) + - D:(A;ID;0x1200a9;;;AC)(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;S-1-15-2-2) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileRemoteAccess + ProductCode: + - xes + - sao + Description_EN: The remote access to the parent file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The object hash ID + Sample: + - '8576474808125313522' + - '-599270888483415002' + - '2177864258235728980' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectFileSize + ProductCode: + - xes + - sao + - sds + - ddr + Description_EN: The file size of the object file + Sample: + - 0 + - 59456 + - 60 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectCurrentFileSize + ProductCode: + - xes + - sao + - sds + Description_EN: Previous size of modified object file + Sample: + - 0 + - 59456 + - 60 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the object file was created + Sample: + - '1652131848000' + - '1577865600000' + - '1648279273000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the object file was modified + Sample: + - '1652131848000' + - '1577865600000' + - '1648279273000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCurrentOwnerSid + ProductCode: + - xes + - sao + Description_EN: The current security identifier owner of the object file + Sample: + - S-1-5-18 + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCurrentOwnerName + ProductCode: + - xes + - sao + Description_EN: The current owner name of the object file + Sample: + - NT AUTHORITY\SYSTEM + - BUILTIN\Administrators + - BUILTIN\Administradores + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileOwnerSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the object file owner + Sample: + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The object file owner name + Sample: + - root + - NT SERVICE\TrustedInstaller + - BUILTIN\Administrators + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileGroupSid + ProductCode: + - xes + - sao + Description_EN: The security identifier of the object file group + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-21-397955417-626881126-188441444-513 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The object file user group name + Sample: + - wheel + - staff + - admin + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileSaclString + ProductCode: + - sao + - xes + Description_EN: The system access control list of the object file + Sample: + - S:NO_ACCESS_CONTROL + - S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD) + - S:(AU;SAFA;0x1f0116;;;WD) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileDaclString + ProductCode: + - xes + - sao + Description_EN: The discretionary access control list of the object file + Sample: + - D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2) + - D:(A;OICI;GA;;;SY)(A;OICI;0xa0120000;;;WD)(A;OICI;GA;;;BA) + - D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;AC)(A;ID;0x1200a9;;;S-1-15-2-2) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileIsRemoteAccess + ProductCode: + - sao + - xes + - sds + Description_EN: The remote access to the object file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFirstSeen + ProductCode: + - xes + - sds + - sao + Description_EN: The first time the object was seen + Sample: + - '1656458063638' + - '1656260547165' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLastSeen + ProductCode: + - xes + - sds + - sao + Description_EN: The last time the object was seen + Sample: + - '1656458354730' + - '1656260580722' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashId + ProductCode: + - xes + - sao + - sds + Description_EN: The source file hash ID + Sample: + - '1102079405020678318' + - '-6926286289273504319' + - '8528955148329941480' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcSigner + ProductCode: + - sao + - xes + Description_EN: The signer of the source file + Sample: + - Microsoft Windows + - Microsoft Corporation + - Google LLC + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcSignerValid + ProductCode: + - sao + - xes + Description_EN: The validity of the source file signer + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcSignerFlagsAdhoc + ProductCode: + - xes + - sao + Description_EN: The list of source file signature adhoc flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcSignerFlagsRuntime + ProductCode: + - xes + - sao + Description_EN: The list of source file signature runtime flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcSignerFlagsLibValid + ProductCode: + - xes + - sao + Description_EN: The list of source file signature library validation flags + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileSize + ProductCode: + - xes + - sao + - sds + - ddr + Description_EN: The file size of the source file + Sample: + - '0' + - '131072' + - '196608' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileCreation + ProductCode: + - xes + - sao + - sds + Description_EN: The time the source file was created + Sample: + - '1577865600000' + - '1626201752000' + - '1626201750000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileModifiedTime + ProductCode: + - xes + - sao + - sds + Description_EN: The time the source file was modified + Sample: + - '1626201752000' + - '1626201750000' + - '1577865600000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: The true file type of the source file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcSubTrueType + ProductCode: + - sao + - xes + - sds + Description_EN: The true file subtype of the source file + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: srcFileCurrentOwnerSid + ProductCode: + - sao + - xes + Description_EN: The current security identifier owner of the source file + Sample: + - S-1-5-18 + - S-1-5-32-544 + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileCurrentOwnerName + ProductCode: + - sao + - xes + Description_EN: The current owner name of the source file + Sample: + - NT AUTHORITY\SYSTEM + - BUILTIN\Administrators + - AUTORIDADE NT\SISTEMA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileOwnerSid + ProductCode: + - sao + - xes + Description_EN: The security identifier of the source file owner + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-32-544 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileOwnerName + ProductCode: + - xes + - sao + - sds + Description_EN: The source file owner name + Sample: + - root + - NT SERVICE\TrustedInstaller + - NT AUTHORITY\SYSTEM + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileGroupSid + ProductCode: + - sao + - xes + Description_EN: The security identifier of the source file group + Sample: + - S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 + - S-1-5-18 + - S-1-5-21-3770350686-3666354711-3866293128-513 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileGroupName + ProductCode: + - xes + - sao + - sds + Description_EN: The source file user group name + Sample: + - wheel + - staff + - NT SERVICE\TrustedInstaller + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileSaclString + ProductCode: + - sao + - xes + Description_EN: The system access control list of the source file + Sample: + - S:NO_ACCESS_CONTROL + - S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD) + - S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileDaclString + ProductCode: + - xes + - sao + Description_EN: The discretionary access control list of the source file + Sample: + - D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2) + - D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;AC)(A;ID;0x1200a9;;;S-1-15-2-2) + - D:(A;ID;FA;;;SY)(A;ID;FA;;;BA) + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileIsRemoteAccess + ProductCode: + - xes + - sao + - sds + Description_EN: The remote access of the source file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFirstSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The first time the source file was seen + Sample: + - '0' + - '1656355418449' + - '1656714760440' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcLastSeen + ProductCode: + - sds + - xes + - sao + Description_EN: The last time the source file was seen + Sample: + - '0' + - '1656355418449' + - '1656715147313' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hookId + ProductCode: + - sao + Description_EN: The hook ID + Sample: + - '-1' + - '5' + - '4' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectThreadId + ProductCode: + - sao + Description_EN: The object process thread ID + Sample: + - '10196' + - '10104' + - '10004' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: moduleName + ProductCode: + - sao + Description_EN: The module where a hook procedure was set up + Sample: + - c:\program files (x86)\desktopcentral_agent\bin\dcusbsummary.exe + - c:\program files\common files\microsoft shared\clicktorun\officesvcmgr.exe + - c:\program files (x86)\sharp\sharp pen software\prsnspttool.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: proxy + ProductCode: + - xes + - sao + Description_EN: The proxy address + Sample: + - proxy.sample:8080 + - 10.10.10.10:8080 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The object file hash ID + Sample: + - '2141057820373638746' + - '-6516669617381620295' + - '-4912169863817247597' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileRemoteAccess + ProductCode: + - xes + - sao + Description_EN: The remote access for the object file + Sample: [] + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: providerName + ProductCode: + - xes + - sao + Description_EN: The name of the Windows event provider + Sample: + - Microsoft-Windows-Security-Auditing + - Microsoft-Windows-WMI-Activity + - Microsoft-Windows-TaskScheduler + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: providerGUID + ProductCode: + - xes + - sao + Description_EN: The GUID of the Windows event provider + Sample: + - '{11111111-1111-1111-1111-111111111111}' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: channel + ProductCode: + - xes + - sao + Description_EN: The Windows event channel + Sample: + - Security + - Microsoft-Windows-WMI-Activity/Trace + - Microsoft-Windows-TaskScheduler/Operational + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - xes + - sao + Description_EN: The event time + Sample: + - 1657781088000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rawDataSize + ProductCode: + - xes + - sao + Description_EN: The size of the Windows event log + Sample: + - '1128' + - '1129' + - '1127' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: correlationData + ProductCode: + - xes + - sao + Description_EN: The data for correlation + Sample: [] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataLogonProcessName + ProductCode: + - xes + - sao + Description_EN: The name of the Windows event sign in process name + Sample: + - 'NtLmSsp ' + - 'Advapi ' + - Advapi + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataAuthenticationPackageName + ProductCode: + - xes + - sao + Description_EN: The authentication package name of the Windows event data + Sample: + - NTLM + - Negotiate + - MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataStatus + ProductCode: + - xes + - sao + Description_EN: The Windows event data status + Sample: + - '0xc000006d' + - '-1073741715' + - '0xc000006e' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataSubStatus + ProductCode: + - xes + - sao + Description_EN: The Windows event data sub status + Sample: + - '0xc0000064' + - '0xc000006a' + - '-1073741724' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataJobOwner + ProductCode: + - sao + Description_EN: The name of the account that initiated the event + Sample: + - BEI\holdej + - NT AUTHORITY\SYSTEM + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataProcessPath + ProductCode: + - sao + Description_EN: The process path that initiated the event + Sample: + - C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE + - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe + - C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTargetUserName + ProductCode: + - sao + Description_EN: The user name of the Windows event data target + Sample: + - Offer Remote Assistance Helpers + - Administrators + - Administradores + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataActionName + ProductCode: + - sao + - xes + Description_EN: The action performed + Sample: + - Language Components Installer + - Group Policy Background Processing + - C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTaskName + ProductCode: + - xes + - sao + Description_EN: The task name logged by the Windows event + Sample: + - \Microsoft\Windows\LanguageComponentsInstaller\Installation + - \Microsoft\Office\Office Serviceability Manager + - \MicrosoftEdgeUpdateTaskMachineUA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataUserContext + ProductCode: + - xes + - sao + Description_EN: The user context of the Windows event data + Sample: + - MP\MPBSA179345$ + - MP\MPBSASPU179370$ + - MP\MPBSA4025625$ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataPath + ProductCode: + - xes + - sao + Description_EN: The path of the Windows event data + Sample: + - C:\Program Files\Common Files\Microsoft Shared\ClickToRun\officesvcmgr.exe + - taskhostw.exe + - gpupdate.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectName + ProductCode: + - sds + - xes + - sao + Description_EN: The object name + Sample: + - /usr/bin/bash + - /bin/bash + - /opt/folder1/probes/system/processes/processes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSessionId + ProductCode: + - xes + - sao + - sds + Description_EN: The object session ID + Sample: + - '0' + - '1' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLaunchTime + ProductCode: + - sds + - xes + - sao + Description_EN: The object launch time of the Windows event + Sample: + - '1616412892557' + - '1620778597056' + - '1616414113105' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAuthId + ProductCode: + - xes + - sao + Description_EN: The object authorization ID + Sample: + - '999' + - '996' + - '997' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectUserDomain + ProductCode: + - xes + - sao + - sds + Description_EN: The object user domain + Sample: + - NT AUTHORITY + - AUTORIDADE NT + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectUserGroup + ProductCode: + - xes + - sao + - sds + Description_EN: The user group name + Sample: + - staff + - _spotlight + - wheel + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcHashId + ProductCode: + - sds + - xes + - sao + Description_EN: The source hash ID + Sample: + - '4070054759888344851' + - '2177864258235728980' + - '3476454206648023552' + DL_Type: long + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: proto + ProductCode: + - sds + - xes + - sao + Description_EN: The protocol type + Sample: + - TELEMETRY_CONNECTION_TCP + - TELEMETRY_CONNECTION_UDP + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectContentName + ProductCode: + - xes + - sds + - sao + Description_EN: The AMSI object content name + Sample: + - C:\Program + Files\WindowsPowerShell\Modules\PowerShellGet\1.2\PowerShellGet.psd1 + - c:\synclog\BLAST_SCAN.vbs + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRawDataSize + ProductCode: + - xes + - sds + - sao + Description_EN: The raw data size of the Windows event object + Sample: + - '9' + - '1' + - '564' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRunAsLocalAccount + ProductCode: + - sds + - xes + - sao + Description_EN: The "runas" command uses a local account + Sample: + - 0 + - 1 + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectRegistryRoot + ProductCode: + - xes + - sds + - sao + Description_EN: The Windows Registry Root ID + Sample: + - '3' + - '1' + - '2' + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: objectRegType + ProductCode: + - sds + - xes + - sao + Description_EN: The Windows Registry Type ID + Sample: + - 1 + - 11 + - 4 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: subSystem + ProductCode: + - xes + - sao + Description_EN: The sub system information + Sample: + - com.apple.xpc + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventMessage + ProductCode: + - xes + - sao + Description_EN: The event message + Sample: + - '[0x13bb4e2a0] activating connection: mach=true listener=false peer=false name=com.apple.airportd' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: messageType + ProductCode: + - xes + - sao + Description_EN: The message type + Sample: + - Default + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleId + ProductCode: + - xes + - sao + Description_EN: The rule ID + Sample: + - 1005566 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: additionalInfo + ProductCode: + - xes + - sao + Description_EN: The filter rule info + Sample: + - Default + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutHashId + ProductCode: + - xes + - sao + Description_EN: The FNV of the object sign-in/sign-out meta + Sample: + - -8981232070268295229 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutFirstSeen + ProductCode: + - xes + - sao + Description_EN: The first time the object sign-in/sign-out was seen + Sample: + - '1713903612' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutLastSeen + ProductCode: + - xes + - sao + Description_EN: The last time the object sign-in/sign-out was seen + Sample: + - '1713903612' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutMetaType + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out meta + Sample: + - 1 - LOGIN_OUT_META_TYPE_OPENSSH + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutSourceAddress + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out source IP + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutStatus + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out status + Sample: + - -1 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutFailureMessage + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out error message + Sample: + - Login incorrect + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLoginOutSessionId + ProductCode: + - xes + - sao + Description_EN: The sign-in/sign-out session ID + Sample: + - 260 + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the parent image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: processFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the process image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileOriginalName + ProductCode: + - xes + - sao + - sds + Description_EN: The original file name of the object image + Sample: + - Taskmgr.exe + - WINLOGON.EXE + - svchost.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: requestMethod + ProductCode: + - sao + - xes + - sds + Description_EN: The network protocol request method + Sample: + - GET + - POST + - PUT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: status + ProductCode: + - sao + - xes + - sds + Description_EN: The HTTP response status code + Sample: + - 200 + - 500 + - 403 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventDataModuleILPath + ProductCode: + - xes + - sao + Description_EN: The CIL image path of the module or the dynamic module name + Sample: + - C:\Program Files\Cymulate\Agent\System.Threading.dll + - C:\windows\system32\tzsync.exe + - C:\Program.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataFullyQualifiedAssemblyName + ProductCode: + - xes + - sao + Description_EN: The fully qualified .NET assembly name + Sample: + - System.Runtime, Version=6.0.0.0, Culture=neutral, + PublicKeyToken=b03f5f7f11d50a3a + - System.Xml, Version=4.0.0.0, Culture=neutral, + PublicKeyToken=b77a5c561934e089 + - System.Diagnostics.Process, Version=8.0.0.0, Culture=neutral, + PublicKeyToken=b03f5f7f11d50a3a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTargetDomainName + ProductCode: + - xes + - sao + Description_EN: The target sign-in account domain or computer name + Sample: + - NT AUTHORITY + - Builtin + - SHOCKWAVE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTicketEncryptionType + ProductCode: + - xes + - sao + Description_EN: The cryptographic suite used for the Kerberos TGS + Sample: + - '0x12' + - '0x17' + - '0x18' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataImpersonationLevel + ProductCode: + - xes + - sao + Description_EN: The sign-in session impersonation level + Sample: + - '%%1830' + - '%%1832' + - '%%1833' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataElevatedToken + ProductCode: + - xes + - sao + Description_EN: Whether the session is elevated and has administrator + privileges + Sample: + - '%%1842' + - '%%1843' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataObjectName + ProductCode: + - xes + - sao + Description_EN: The identifying information about the object for which access + was requested + Sample: + - \Device\HarddiskVolume2\Windows\System32\lsass.exe + - C:\Windows\System32\osk.exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataObjectType + ProductCode: + - xes + - sao + Description_EN: The object type + Sample: + - Process + - File + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataAccessList + ProductCode: + - xes + - sao + Description_EN: The list of requested access rights + Sample: + - '%%4416' + - '%%4417' + - '%%4418' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataAccessMask + ProductCode: + - xes + - sao + Description_EN: The hexadecimal value of the requested or used permissions + during an access attempt + Sample: + - 0x10 + - 0x80000000 + - 0x100000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataSubjectUserName + ProductCode: + - xes + - sao + Description_EN: The account name + Sample: + - dadmin + - Alex + - london$ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTargetName + ProductCode: + - xes + - sao + Description_EN: The service, application, or network resource name + Sample: + - Microsoft_RssPlatform_* + - WindowsLive:target=virtualapp/didlogical + - MicrosoftOffice* + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataWorkstationName + ProductCode: + - xes + - sao + Description_EN: The name of the computer used in the sign-in attempt + Sample: + - WIN-GG82ULGC9GO + - DESKTOP-123ABC + - CLIENT01 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: customAssetTags + ProductCode: + - xes + - sds + - sao + Description_EN: The list of custom asset tags + Sample: + - '{"os":["linux", "windows"], "org":["bu1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: platformAssetTags + ProductCode: + - xes + - sds + - sao + Description_EN: The list of platform custom asset tags + Sample: + - '{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventDataTicketOptions + ProductCode: + - xes + - sao + Description_EN: The authentication request Kerberos ticket behavior and + permissions flags + Sample: + - '0x40810000' + - '0x40810010' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Endpoint/Trend Micro Deep Security.yaml b/doc_v2/Endpoint/Trend Micro Deep Security.yaml new file mode 100644 index 0000000..0dd07fc --- /dev/null +++ b/doc_v2/Endpoint/Trend Micro Deep Security.yaml @@ -0,0 +1,1447 @@ +- Name: hostName + ProductCode: + - pdi + - xns + - sds + - pds + - ptn + Description_EN: The computer name of the client host (The hostname from the + suspicious URL detected by Deep Discovery Inspector) + Sample: + - Let's Encrypt + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: interestedHost + ProductCode: + - sds + - pdi + - xns + - pds + - sao + Description_EN: The endpoint hostname (For example, if an intranet host + accesses a suspicious internet host, the intranet host is the "peerHost" and + the internet host is the "interestedHost") + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - es-dtc-w-dc02.example.corp + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: true +- Name: shost + ProductCode: + - sds + - pdi + - xns + - pds + - mns + Description_EN: The source hostname + Sample: + - dns.google + - sw_us-east-1a_10-124-17-69 + - sw_us-east-1c_10-124-21-139 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: interestedIp + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - ptn + Description_EN: The IP of the interestedHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: endpointIp + ProductCode: + - sds + - pds + - sao + - ptp + - stp + - ptn + - sss + - ddr + Description_EN: The IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: filePath + ProductCode: + - sds + - pds + - sao + - pdi + - xns + - pts + - sfs + - sfc + Description_EN: The file path without the file name + Sample: + - security + - /var/log/audit/audit.log + - application + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: filePathName + ProductCode: + - sds + - pdi + - xns + - pds + - pts + Description_EN: The file path with the file name + Sample: + - vss + - spoolss + - /etc/hosts + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: oldFileHash + ProductCode: + - sds + - pds + Description_EN: The SHA-1 of the target process image or target file + (wasEntity from an IM event) + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 57247B810B0EE61DD86CE24AC14097B9B5405EEC + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: processCmd + ProductCode: + - sds + - xes + - pds + - sao + - scs + Description_EN: The subject process command line + Sample: + - '"C:\Program Files (x86)\AADM\AADM.exe" ' + - /usr/lib/inet/sendmail -bl -q15m + - ComDir + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: duser + ProductCode: + - sds + - pds + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email recipient + Sample: + - (no user) + - SYSTEM + - ' SYSTEM' + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: true +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleId + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - mns + Description_EN: The rule ID + Sample: + - 1002795 + - 1003802 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: subRuleId + ProductCode: + - sds + - pds + - stp + Description_EN: ID of a subordinate rule + Sample: + - '85262' + - '914520' + - '18152' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: subRuleName + ProductCode: + - sds + - pds + - sca + - sem + - xms + Description_EN: The subrule name + Sample: + - Pre-authentication failed. + - 'ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System + Logs,File Deletion ' + - 'ATTACK T1110: Multiple Windows Logon Failures' + - invisible_url_domain + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: policyId + ProductCode: + - ptp + - sao + - xes + - stp + - sds + - pds + - scs + Description_EN: The policy ID of which the event was detected + Sample: + - 00000001-0001-0001-0001-000000007610 + - '007' + - '003' + - TM000001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: actResult + ProductCode: + - sao + - sca + - sds + - pds + - pts + - ams + Description_EN: The result of an action + Sample: + - Dropped + - Successful + - Accepted + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanType + ProductCode: + - sca + - sem + - sds + - sao + - pds + - xms + - sfs + - sss + - scs + Description_EN: The scan type + Sample: + - realtime_mailmeta-exchange + - exchange_mailbox_realtime_detection_logs + - gateway_realtime_blocking_traffic + - malware_schedule_image + - malware_schedule_file + - malware_realtime_image + - malware_realtime_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: majorVirusType + ProductCode: + - pds + - sds + - ams + - ptn + - pts + - sfc + Description_EN: The virus type + Sample: + - Virus + - Suspicious Activity + - Trojan + - TROJ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: behaviorCat + ProductCode: + - sao + - xes + - sds + - pds + Description_EN: The matched policy category + Sample: + - Policy Enforcement + - Grey-Detection + - Threat-Detection + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cat + ProductCode: + - sds + - pds + - sao + Description_EN: The weighted priority of the incident + Sample: + - 100 + - 200 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceDirection + ProductCode: + - pdi + - xns + - pds + Description_EN: Device Direction. If the source IP is in the internal network + (the network monitored by Deep Discovery Inspector) it is tagged as + outbound. All other cases are inbound. Internal-to-internal is also tagged + as outbound. + Sample: + - outbound + - inbound + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dmac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The MAC address of the destination IP (dest_ip) + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileOperation + ProductCode: + - sds + - pds + Description_EN: The operation of the file + Sample: + - Created + - Updated + - Deleted + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstAct + ProductCode: + - sds + - sao + - pds + Description_EN: The first scan action + Sample: + - Pass + - Quarantine + - Clean + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstActResult + ProductCode: + - sds + - sao + - pds + Description_EN: The first scan action result + Sample: + - File passed + - Unable to quarantine file + - File quarantined + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: groups + ProductCode: + - sds + - pds + Description_EN: The OSSEC rule group names + Sample: + - auditd,audit, + - dirservice_log,authentication_failure, + - windows,authentication_failures, + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hostId + ProductCode: + - sds + - pds + Description_EN: The host ID + Sample: + - 20548 + - 967 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: mDeviceGUID + ProductCode: + - sds + - sao + - pds + Description_EN: The GUID of the agent host + Sample: + - C5B09EDD-C725-907F-29D9-B8C30D18C48F + - C05B75AB-B518-BDD0-D2B5-E9CB631C539F + - 9C28ACD3-D0EC-22A4-B08D-5B0BEFF501FC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malType + ProductCode: + - pdi + - xns + - sds + - sao + - pds + - sfs + - scs + Description_EN: The risk type for Network Content Correlation Engine rules + Sample: + - OTHERS + - MALWARE + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpname + ProductCode: + - sds + - sao + - pds + - ptp + - xes + - stp + Description_EN: The management product name + Sample: + - Cloud One - Workload Security + - Apex Central + - Deep Security Software + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpver + ProductCode: + - sds + - pds + - sao + - xes + Description_EN: The product version + Sample: + - Microsoft-Windows-Security-Auditing + - Level -- Medium security + - TASK1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: out + ProductCode: + - sds + - pds + Description_EN: The IP datagram length (in bytes) + Sample: + - '0' + - '439' + - '1314' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pTags + ProductCode: + - pds + Description_EN: The event tagging system + Sample: + - attack-T1059.001, mitre attack detection + - suppress_alert + - SMB + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processName + ProductCode: + - sds + - xes + - pds + - scs + - sao + Description_EN: The image name of the process that triggered the event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + - ProcessName + DL_Searchable: true + DL_Aggregable: false +- Name: proto + ProductCode: + - sds + - pds + - ptn + - scs + - mns + Description_EN: The exploited layer network protocol + Sample: + - '6' + - TCP + - '17' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: protoFlag + ProductCode: + - sds + - pds + Description_EN: The data flags + Sample: + - ACK PSH DF=1 + - ACK DF=1 + - DF=1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtDate + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The date of the log generation + Sample: + - 1655337600000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rtHour + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The hour of the log generation + Sample: + - 9 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtWeekDay + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The weekday of the log generation + Sample: + - Monday + - Tuesday + - Friday + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: secondAct + ProductCode: + - sds + - sao + - pds + Description_EN: The second scan action + Sample: + - Unknown + - N/A + - Deny Access + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: secondActResult + ProductCode: + - sds + - sao + - pds + Description_EN: The result of the second scan action + Sample: + - Unknown + - N/A + - Access denied + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: senderGUID + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The sender GUID + Sample: + - 346648FC-9862-D2F0-F94C-FAB1A838ABD7 + - 36E5239E-EEBA-0100-C10E-C057E0455E1D + - 9606BBD5-38A7-9024-83C8-9C88A2AF90CC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: smac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The source MAC address + Sample: + - 00:11:22:33:44:55 + - 66:77:88:99:AA:BB + - CC:DD:EE:FF:00:11 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sproc + ProductCode: + - sds + - pds + Description_EN: The OSSEC program name + Sample: + - postfix/sendmail + - CRON + - sshd + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: parentPid + ProductCode: + - sds + - xes + - pds + - scs + Description_EN: The PID of the parent process + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mitreVersion + ProductCode: + - pdi + - xns + - sds + - pds + Description_EN: The MITRE version + Sample: + - v9 + - v6 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: wasEntity + ProductCode: + - sds + - pds + Description_EN: The entity before change/modification + Sample: + - '{"key":"","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"stopped","name":"state","value":"1"}]}' + - '{"key":"","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"running","name":"state","value":"4"}]}' + - '{"key":"","type":"File","attributes":[]}' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: isEntity + ProductCode: + - sds + - pds + Description_EN: The current entity (or after change/modification) + Sample: + - '{"key":"","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"running","name":"state","value":"4"}]}' + - '{"key":"":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"stopped","name":"state","value":"1"}]}' + - '{"key":"","type":"File","attributes":[]}' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: targetType + ProductCode: + - sds + - pds + Description_EN: The target object type + Sample: + - File System + - Uncategorized + - Exploit + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: processImagePath + ProductCode: + - sds + - xes + - pds + - scs + Description_EN: The process triggered by the file event + Sample: + - c:\windows\system32\svchost.exe + - /usr/bin/python2.7 + - /usr/bin/sed + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFilePath + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The file path of the quarantined object + Sample: + - C:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: winEventId + ProductCode: + - sds + - pds + Description_EN: The Windows Event ID + Sample: + - 11 + - 4624 + - 4670 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: target + ProductCode: + - sds + - pds + Description_EN: The target object for the behavior + Sample: + - c:\windows\system32\windowspowershell\v1.0\powershell.exe + - zwwritevirtualmemory + - /proc/211296/exe + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileId + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The unique identifier of the quarantined object + Sample: + - ASLUMVS0.4FC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileSha256 + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The SHA-256 of the quarantined object + Sample: + - 84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: detectionNames + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The rules that triggered the event + Sample: + - [HS_EMOTET.SMAA, HM_AVEDOWN.SMZTIG-A, HE_DOCQRPHISH.SM] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false +- Name: detectionMeta + ProductCode: + - sao + - pao + - sds + - pds + Description_EN: The descriptions of the detected techniques + Sample: + - [T1204 some description about this technique, T1573.001_AES another + description about this technique] + DL_Type: dynamic + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Identity/Active Directory (on-premises).yaml b/doc_v2/Identity/Active Directory (on-premises).yaml new file mode 100644 index 0000000..3804094 --- /dev/null +++ b/doc_v2/Identity/Active Directory (on-premises).yaml @@ -0,0 +1,11 @@ +- Name: netBiosDomainName + ProductCode: + - opa + Description_EN: The NetBIOS domain name + Sample: + - TREND + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Identity/Microsoft Entra ID.yaml b/doc_v2/Identity/Microsoft Entra ID.yaml new file mode 100644 index 0000000..662a415 --- /dev/null +++ b/doc_v2/Identity/Microsoft Entra ID.yaml @@ -0,0 +1,721 @@ +- Name: signInCountries + ProductCode: + - sca + - aad + Description_EN: The countries from which a user signed in + Sample: + - PH + - AU + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventTime + ProductCode: + - aad + Description_EN: The time the identity provider detected the event + Sample: + - 1657781088000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: productCode + ProductCode: + - ALL + - aad + Description_EN: The internal product code of the identity provider + (aad=Microsoft Entra ID, opa=Microsoft Active Directory) + Sample: + - aad + - opa + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventId + ProductCode: + - aad + Description_EN: The identity provider event ID + Sample: + - 1 - EVENT_SOURCE_AAD_SIGN_INS + - 2 - EVENT_SOURCE_AAD_DIR_AUDIT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - aad + Description_EN: The identity provider event name + Sample: + - 4624 + - aad_signin + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: idpName + ProductCode: + - aad + Description_EN: The identity provider + Sample: + - Microsoft Entra ID + - Microsoft Active Directory + - google + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: idpId + ProductCode: + - aad + Description_EN: The internal product code of the identity provider + Sample: + - aad + - opa + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: locationCountry + ProductCode: + - aad + Description_EN: The country where the event happened + Sample: + - US + - TW + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: locationCity + ProductCode: + - aad + Description_EN: The city where the event happened + Sample: + - Singapore + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: locationState + ProductCode: + - aad + Description_EN: The state where the event happened + Sample: + - Central Singapore + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: locationLongitude + ProductCode: + - aad + Description_EN: The longitude of the event location + Sample: + - 121.568 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: locationLatitude + ProductCode: + - aad + Description_EN: The latitude of the event location + Sample: + - 121.568 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientId + ProductCode: + - aad + Description_EN: The unique client device ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientDisplayName + ProductCode: + - aad + Description_EN: The client display name + Sample: + - DESKTOP-TKOS222 + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: false +- Name: clientOS + ProductCode: + - aad + Description_EN: The client OS + Sample: + - Windows + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientBrowser + ProductCode: + - aad + Description_EN: The client browser + Sample: + - Chrome 119.0.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientApp + ProductCode: + - aad + Description_EN: The app that the client accessed + Sample: + - browser + - Mobile Apps and Desktop clients + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ipAddress + ProductCode: + - aad + Description_EN: The client IP + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: userId + ProductCode: + - aad + Description_EN: The user ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: userDisplayName + ProductCode: + - aad + Description_EN: The user display name + Sample: + - Test User(RD-TW) + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: statusDetail + ProductCode: + - aad + Description_EN: The additional information about sign-in status + Sample: + - MFA requirement satisfied by claim in the token + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: status + ProductCode: + - aad + Description_EN: The sign-in status result + Sample: + - 0 + - 50126 + - 50155 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: statusReason + ProductCode: + - aad + Description_EN: The sign-in status + Sample: + - Error validating credentials due to invalid username or password. + - Others. + - '' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: targetResourceId + ProductCode: + - aad + Description_EN: The target resource ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: targetResourceDisplayName + ProductCode: + - aad + Description_EN: The target resource display name + Sample: + - Microsoft Graph + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestMethod + ProductCode: + - aad + Description_EN: The sign-in authentication method + Sample: + - '[{"authenticationStepDateTime": "2023-11-28T03:44:05Z","authenticationMethod": + "Previously satisfied","authenticationMethodDetail": null,"succeeded" : true,"authenticationStepResultDetail": + "MFA requirement satisfied by claim in the Token","authenticationStepRequirement": + ""}]' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventAdditionalDetails + ProductCode: + - aad + Description_EN: The raw data string that contains additional information + Sample: + - '[{"key": "","value": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)"}]' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventCategory + ProductCode: + - aad + Description_EN: The resource category targeted by the event + Sample: + - UserManagement + - ApplicationManagement + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByAppId + ProductCode: + - aad + Description_EN: The resource category targeted by the event + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByAppDisplayName + ProductCode: + - aad + Description_EN: The application display name + Sample: + - Microsoft Intune + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByServicePrincipalId + ProductCode: + - aad + Description_EN: The unique ID of the service principal + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByServicePrincipalName + ProductCode: + - aad + Description_EN: The unique ID of the service principal + Sample: + - '' + - Microsoft Intune + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByUserId + ProductCode: + - aad + Description_EN: The unique ID of the user who initiated the event + Sample: + - '' + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByUserDisplayName + ProductCode: + - aad + Description_EN: The user display name + Sample: + - Sample User + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByUserHomeTenantId + ProductCode: + - aad + Description_EN: The tenant ID of the user + Sample: + - '' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByUserHomeTenantName + ProductCode: + - aad + Description_EN: The tenant ID of the user + Sample: + - '' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByUserIpAddress + ProductCode: + - aad + Description_EN: The client IP of the user + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: initiatedByUserPrincipalName + ProductCode: + - aad + Description_EN: The User Principal Name of the user + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: loggedByService + ProductCode: + - aad + Description_EN: The service that initiated the event + Sample: + - Core Directory + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: operationType + ProductCode: + - aad + Description_EN: The operation performed in the event + Sample: + - Add + - Assign + - Update + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: result + ProductCode: + - aad + Description_EN: The event result + Sample: + - success + - failure + - timeout + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: resultReason + ProductCode: + - aad + Description_EN: The cause of event failure or timeout + Sample: + - success + - failure + - timeout + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: targetResources + ProductCode: + - aad + Description_EN: The targeted resource of the event + Sample: + - '' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userAgent + ProductCode: + - aad + Description_EN: The user agent + Sample: + - Microsoft.OData.Client/7.12.5 + - Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, + like Gecko) Chrome/119.0.0.0 Safari/537.36 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - aad + Description_EN: The internal product ID + Sample: + - '2200' + - '751' + - '533' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: actionName + ProductCode: + - aad + Description_EN: The user or service action + Sample: + - Create User + - Add member to group + - Update application + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: correlationId + ProductCode: + - aad + Description_EN: The correlation id + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: principalName + ProductCode: + - aad + Description_EN: The User Principal Name + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: logBatchId + ProductCode: + - aad + Description_EN: The batch data retrieval process ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: orgId + ProductCode: + - aad + Description_EN: The organization ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: tenantId + ProductCode: + - aad + Description_EN: The Microsoft Entra ID Tenant ID of the organization + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: authenticationProtocol + ProductCode: + - aad + Description_EN: The authentication protocol or grant type + Sample: + - none + - oAuth2 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: autonomousSystemNumber + ProductCode: + - aad + Description_EN: The network Autonomous System Number + Sample: + - 1023 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientCredentialType + ProductCode: + - aad + Description_EN: The user client or service principal credential type + Sample: + - none + - clientSecret + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: crossTenantAccessType + ProductCode: + - aad + Description_EN: The cross-tenant access type + Sample: + - none + - b2bCollaboration + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: incomingTokentype + ProductCode: + - aad + Description_EN: The authentication token types + Sample: + - none + - primaryRefreshToken + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: servicePrincipalId + ProductCode: + - aad + Description_EN: The service principal ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: servicePrincipalName + ProductCode: + - aad + Description_EN: The service principal name + Sample: + - Service_01 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: signInIdentifierType + ProductCode: + - aad + Description_EN: The sign-in ID type + Sample: + - userPrincipalName + - phoneNumber + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userSessionId + ProductCode: + - aad + Description_EN: The session ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: idpIssuerName + ProductCode: + - aad + Description_EN: The identity provider that issued the token + Sample: + - sts.microsoft.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userType + ProductCode: + - aad + Description_EN: The tenant user type + Sample: + - member + - guest + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskEventTypes + ProductCode: + - aad + Description_EN: The associated sign-in risk event types + Sample: + - [unlikelyTravel, anonymizedIPAddress] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: signInEventTypes + ProductCode: + - aad + Description_EN: The sign-in event type + Sample: + - [interactiveUser, nonInteractiveUser] + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: application + ProductCode: + - aad + Description_EN: The displayed application name + Sample: + - app01 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: applicationId + ProductCode: + - aad + Description_EN: The Microsoft Entra ID application ID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: conditionalAccessStatus + ProductCode: + - aad + Description_EN: The conditional access policy status + Sample: + - success + - failure + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Network/Mobile Network Security.yaml b/doc_v2/Network/Mobile Network Security.yaml new file mode 100644 index 0000000..a15b83a --- /dev/null +++ b/doc_v2/Network/Mobile Network Security.yaml @@ -0,0 +1,664 @@ +- Name: shost + ProductCode: + - sds + - pdi + - xns + - pds + - mns + Description_EN: The source hostname + Sample: + - dns.google + - sw_us-east-1a_10-124-17-69 + - sw_us-east-1c_10-124-21-139 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: dhost + ProductCode: + - pdi + - xns + - mns + Description_EN: The destination hostname + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: category + ProductCode: + - ptp + - mns + - sds + Description_EN: The event category + Sample: + - Exploits + - Reconnaissance + - Vulnerabilities + - Security Policy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleId + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - mns + Description_EN: The rule ID + Sample: + - 1002795 + - 1003802 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: malSrc + ProductCode: + - sao + - mns + Description_EN: The malware infection source + Sample: + - \\10.172.1.33\kortiz + - \\10.240.0.148\wbind + - \\10.240.1.69\MT26933059 + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: policyName + ProductCode: + - sao + - sca + - sws + - sem + - sig + - ptn + - scs + - mns + Description_EN: The name of the triggered policy + Sample: + - Steelcase + - Cabot + - Tigre - Medium Policy + - apiPostedPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cnt + ProductCode: + - pdi + - xns + - ptn + - mns + Description_EN: The total number of logs + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dOSName + ProductCode: + - pdi + - xns + - mns + Description_EN: The destination host OS + Sample: + - Windows + - Windows 10 + - Android + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstGroup + ProductCode: + - pdi + - xns + - mns + Description_EN: The group name defined by the administrator of the destination + Sample: + - Default + - Data Center Services DL_Deployed Block + - Rede Wifi Visitantes-Pacientes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: proto + ProductCode: + - sds + - pds + - ptn + - scs + - mns + Description_EN: The exploited layer network protocol + Sample: + - '6' + - TCP + - '17' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sOSName + ProductCode: + - pdi + - xns + - mns + Description_EN: The source OS + Sample: + - Windows + - Windows 10 + - Windows XP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcGroup + ProductCode: + - pdi + - xns + - mns + Description_EN: The group named defined by the source administrator + Sample: + - Default + - Rede DATACENTER example/example - AD example CORP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vLANId + ProductCode: + - pdi + - xns + - ptn + - mns + Description_EN: The virtual LAN ID + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: instanceId + ProductCode: + - sao + - xes + - sds + - sss + - mns + Description_EN: The ID of the instance that indicates the meta-cloud or data + center VM + Sample: + - 52294e7b-f732-c6e9-b2c3-7a6b6f50d101 + - 00030912-c5e7-4348-9012-7c684751c531 + - 0008ae58-db0c-34ee-3e5c-5dfc9b10a739 + - i-0b22a22eec53b9321 + - /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0 + - ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: instanceName + ProductCode: + - mns + Description_EN: The name of the instance that indicates the meta-cloud or data + center VM + Sample: + - instapecot-1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleId64 + ProductCode: + - ptn + - mns + Description_EN: The IPS rule ID + Sample: + - '1134268' + - '4026531849' + - '4026531852' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: icmpType + ProductCode: + - mns + Description_EN: The ICMP protocol type + Sample: + - 0 + - 3 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: icmpCode + ProductCode: + - mns + Description_EN: The ICMP protocol code field + Sample: + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: srcSubscriberId + ProductCode: + - mns + Description_EN: The source IMSI + Sample: + - 466686007810478 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: srcEquipmentId + ProductCode: + - mns + Description_EN: The source IMEI + Sample: + - 350548054087659 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: srcSubscriberDirNum + ProductCode: + - mns + Description_EN: The source MSISDN + Sample: + - 8618687654321 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: dstSubscriberId + ProductCode: + - mns + Description_EN: The destination IMSI + Sample: + - 466686007810478 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: dstEquipmentId + ProductCode: + - mns + Description_EN: The destination IMEI + Sample: + - 350548054087659 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: dstSubscriberDirNum + ProductCode: + - mns + Description_EN: The destination MSISDN + Sample: + - 8618687654321 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: srcFamily + ProductCode: + - mns + Description_EN: The source device family + Sample: + - Computer + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcType + ProductCode: + - mns + Description_EN: The source device type + Sample: + - Desktop/Laptop + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sOSClass + ProductCode: + - mns + Description_EN: The source device OS class + Sample: + - Linux + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sOSVendor + ProductCode: + - mns + Description_EN: The source device OS vendor + Sample: + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstFamily + ProductCode: + - mns + Description_EN: The destination device family + Sample: + - Computer + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstType + ProductCode: + - mns + Description_EN: The destination device type + Sample: + - Desktop/Laptop + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dOSClass + ProductCode: + - mns + Description_EN: The destination device OS class + Sample: + - Linux + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dOSVendor + ProductCode: + - mns + Description_EN: The destination device OS vendor + Sample: + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Network/Network Sensor.yaml b/doc_v2/Network/Network Sensor.yaml new file mode 100644 index 0000000..c93c688 --- /dev/null +++ b/doc_v2/Network/Network Sensor.yaml @@ -0,0 +1,3555 @@ +- Name: filterRiskLevel + ProductCode: + - ALL + - pdi + - xns + Description_EN: The top level filter risk of the event + Sample: + - info + - low + - medium + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: hostName + ProductCode: + - pdi + - xns + - sds + - pds + - ptn + Description_EN: The computer name of the client host (The hostname from the + suspicious URL detected by Deep Discovery Inspector) + Sample: + - Let's Encrypt + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: interestedHost + ProductCode: + - sds + - pdi + - xns + - pds + - sao + Description_EN: The endpoint hostname (For example, if an intranet host + accesses a suspicious internet host, the intranet host is the "peerHost" and + the internet host is the "interestedHost") + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - es-dtc-w-dc02.example.corp + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: true +- Name: shost + ProductCode: + - sds + - pdi + - xns + - pds + - mns + Description_EN: The source hostname + Sample: + - dns.google + - sw_us-east-1a_10-124-17-69 + - sw_us-east-1c_10-124-21-139 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: dhost + ProductCode: + - pdi + - xns + - mns + Description_EN: The destination hostname + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: denyListHost + ProductCode: + - pdi + - xns + Description_EN: The domain of the Virtual Analyzer Suspicious Object + Sample: + - www.example.dns01.com + - example.com + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: botUrl + ProductCode: + - pdi + - xns + Description_EN: The bot URL + Sample: + - 7?01 + - '0000' + - indows + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDestination + ProductCode: + - pdi + - xns + Description_EN: The destination domain, IP, URL, or recipient + Sample: + - 10.10.10.10:443 + - www.example.dns04.com + - example.ru + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: interestedIp + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - ptn + Description_EN: The IP of the interestedHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: peerIp + ProductCode: + - pdi + - xns + - sao + Description_EN: The IP of peerHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: denyListIp + ProductCode: + - pdi + - xns + Description_EN: The IP of the Virtual Analyzer Suspicious Object + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileName + ProductCode: + - pdi + - xns + - sao + - sfs + - sfc + - sds + - sss + - scs + Description_EN: The file name of the compressed file + Sample: + - /proc/32058/fd/150 + - NONAMEFL + - /proc/10006/fd/30 + - VirusActionSample/RPF2_OtherMalwareSample-other.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileName + ProductCode: + - sca + - sem + - pdi + - xns + - xms + Description_EN: The file name of an attachment + Sample: + - Mail Body + - image001.png + - image002.png + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: filePath + ProductCode: + - sds + - pds + - sao + - pdi + - xns + - pts + - sfs + - sfc + Description_EN: The file path without the file name + Sample: + - security + - /var/log/audit/audit.log + - application + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: filePathName + ProductCode: + - sds + - pdi + - xns + - pds + - pts + Description_EN: The file path with the file name + Sample: + - vss + - spoolss + - /etc/hosts + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: attachmentFileHash + ProductCode: + - pdi + - xns + - xms + Description_EN: The SHA-1 of the email attachment + Sample: + - C9877617DB6715792F9D5C959C1E8D4E56D0C281 + - 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722 + - 0E56D9540B07ED15EF745348D35C72A6A00A0BD9 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHash + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-1 of the decompressed archive + Sample: + - 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA + - FA71B59F35F0EE44D27F74917EF5A0DA2797E80B + - 14D2302172EB81465CE12E01361AE24CDE170F7B + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: denyListFileHash + ProductCode: + - pdi + - xns + Description_EN: The SHA-1 of the Virtual Analyzer Suspicious Object + Sample: + - 746C4D6048A409F33446463B28CA21CB2C5DD941 + - DAA66CE3C1F08144885BB0E99837030C5231DE60 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashSha256 + ProductCode: + - pdi + - xns + - sem + Description_EN: The SHA-256 of the attached file (attachementFileName) + Sample: + - D81D4C14DDEB8CA390FFADA69265AAD46CDEDD72CDD332CB8AA17D924626B397 + - 01DE1FC697D2D0850F0468474A3E1E0BF4D78B23F0633908CF82E504E0DCBFF9 + - 02D16D9970AB635A7B05C3A268E23F5B41C419DD022F1054E9FD912BE130BDB0 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHashSha256 + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-256 of the compressed suspicious file + Sample: + - 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F + - 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE + - 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: suser + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email sender + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: duser + ProductCode: + - sds + - pds + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email recipient + Sample: + - (no user) + - SYSTEM + - ' SYSTEM' + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: true +- Name: mailMsgSubject + ProductCode: + - sca + - pdi + - xns + - sem + - sao + - xms + Description_EN: The email subject + Sample: + - FW. mail subject + - ManageEngine + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: true +- Name: msgId + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The internet message ID + Sample: + - 66.6.00.0006 + - example.test.com + - dameware1svr + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: false +- Name: techniqueId + ProductCode: + - pts + - pdi + - xns + Description_EN: Technique ID detected by the product agent base on a detection + rule + Sample: [] + DL_Type: dynamic + DL_CommonKey: + - Technique + DL_Searchable: true + DL_Aggregable: false +- Name: tags + ProductCode: + - ALL + - sds + - sao + - pdi + - xns + Description_EN: The detected technique ID based on the alert filter + Sample: + - MITREV9.T1090 + - MITRE.T1071 + - MITREV9.T1059.001 + DL_Type: dynamic + DL_CommonKey: + - Technique + - Tactic + DL_Searchable: true + DL_Aggregable: true +- Name: tacticId + ProductCode: + - pdi + - xns + - xes + - sao + Description_EN: The list of MITRE tactic IDs + Sample: + - TA0011 + - TA0008 + - TA0001 + DL_Type: dynamic + DL_CommonKey: + - Tactic + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleId + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - mns + Description_EN: The rule ID + Sample: + - 1002795 + - 1003802 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - pdi + - xns + - sao + - ptp + - xes + - stp + - sig + Description_EN: The GUID of the agent which reported the detection + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: isHidden + ProductCode: + - pdi + - xns + - sao + Description_EN: Whether the detection log generated a grey rule match + Sample: + - Yes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: domainName + ProductCode: + - pdi + - xns + - sao + - sca + Description_EN: The detected domain name + Sample: + - http://10.10.10.10 + - example.domain.com + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: peerHost + ProductCode: + - pdi + - xns + Description_EN: The hostname of peerIp + Sample: + - dns.google + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: httpReferer + ProductCode: + - pdi + - xns + - sds + - sao + Description_EN: The HTTP referer + Sample: + - http://172.16.58.233/ + - http://example/page1/ + - https://www.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: data1 + ProductCode: + - pdi + - xns + Description_EN: The Deep Discover Inspector correlation log metadata + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: targetShare + ProductCode: + - pdi + - xns + Description_EN: 'For HTTPS protocol: Subject State or Province Name; For SMB protocol: + Shared folder' + Sample: + - 3MHIS + - NETLOGON + - CA + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: botCmd + ProductCode: + - pdi + - xns + Description_EN: The bot command + Sample: + - '1068' + - indows + - chrome.exe + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: dUser1 + ProductCode: + - pdi + - xns + Description_EN: The latest sign-in user of the destination + Sample: + - user\example + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: sUser1 + ProductCode: + - pdi + - xns + Description_EN: The latest sign-in user of the source + Sample: + - example\admin + - example.us.com\account + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: cve + ProductCode: + - pdi + - xns + Description_EN: The CVE identifier + Sample: + - MS17-010 + - CVE-2021-45046 + - CVE-2021-44228 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cves + ProductCode: + - ptp + - sds + - pdi + - xns + Description_EN: The CVEs associated with this filter + Sample: + - CVE-2014-3567 + - CVE-2016-6304 + - CVE-2011-1385 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - pdi + - xns + - sws + - sao + - sig + - sca + - ams + - sds + Description_EN: The requested URL category + Sample: + - Untested + - '158' + - Web Advertisement + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appGroup + ProductCode: + - pdi + - xns + Description_EN: The app category of the event + Sample: + - DNS Response + - HTTP + - CIFS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aptRelated + ProductCode: + - pdi + - xns + Description_EN: The event is related to an APT + Sample: + - '0' + - '1' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileSize + ProductCode: + - pdi + - xns + - xms + Description_EN: The file size of the email attachment + Sample: + - '190843' + - '104454' + - '112197' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileType + ProductCode: + - pdi + - xns + Description_EN: The file type of the email attachment + Sample: + - PDF + - TEXT + - PKZIP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDestinationFormat + ProductCode: + - pdi + - xns + Description_EN: C&C server access format + Sample: + - IP_DOMAIN + - URL + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDetection + ProductCode: + - sao + - pdi + - xns + Description_EN: Is this log identified as a C&C callback address detection + Sample: + - Yes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDetectionSource + ProductCode: + - sao + - pdi + - xns + Description_EN: Which list defines this CCCA detection rule + Sample: + - CCCA_GLOBAL_LIST (0) + - GLOBAL_INTELLIGENCE + - USER_DEFINED + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaRiskLevel + ProductCode: + - sao + - pdi + - xns + Description_EN: The severity level of the threat actors associated with the + C&C servers + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientFlag + ProductCode: + - pdi + - xns + Description_EN: Whether the client is a source or destination + Sample: + - dst + - src + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cnt + ProductCode: + - pdi + - xns + - ptn + - mns + Description_EN: The total number of logs + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileSize + ProductCode: + - pdi + - xns + - sfs + - sfc + Description_EN: The file size of the decompressed archive file + Sample: + - '0' + - '265314' + - '175864' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileType + ProductCode: + - pdi + - xns + - sfs + - sfc + - sss + Description_EN: The file type of the decompressed archive file + Sample: + - EXE + - JAVA + - PDF + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: correlationCat + ProductCode: + - pdi + - xns + Description_EN: The correlation category + Sample: + - Suspicious Traffic + - Authentication + - Reconnaissance + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: dOSName + ProductCode: + - pdi + - xns + - mns + Description_EN: The destination host OS + Sample: + - Windows + - Windows 10 + - Android + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data0 + ProductCode: + - pdi + - xns + Description_EN: The value of the DDI Correlation log + Sample: + - '1' + - USR_SUSPICIOUS_IP.UMXX + - USR_SUSPICIOUS_URL.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data0Name + ProductCode: + - pdi + - xns + Description_EN: The name of the DDI Correlation log + Sample: + - Malware Name + - Attacked this IP + - IP Address under Attack + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data1Name + ProductCode: + - pdi + - xns + Description_EN: The name of the DDI Correlation log + Sample: + - Port Used + - Malicious File Transferred To This IP Address + - Malware Server IP Address + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data2 + ProductCode: + - pdi + - xns + Description_EN: The value of the DDI Correlation log + Sample: + - '1' + - '10003' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data2Name + ProductCode: + - pdi + - xns + Description_EN: The name of the DDI Correlation log + Sample: + - Number of Malware Files Downloaded + - Protocol + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data3 + ProductCode: + - pdi + - xns + Description_EN: The value of the DDI Correlation log + Sample: + - '1' + - 10.10.10.10 + - '23903' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data4 + ProductCode: + - pdi + - xns + Description_EN: The value of the DDI Correlation log + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dceHash1 + ProductCode: + - pdi + - xns + Description_EN: The Trend Micro Threat Mitigation Server requires the log, but + the Trend Micro Threat Mitigation Server is EOL. + Sample: + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dceHash2 + ProductCode: + - pdi + - xns + Description_EN: The Trend Micro Threat Mitigation Server requires the log, but + the Trend Micro Threat Mitigation Server is EOL. + Sample: + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: denyListRequest + ProductCode: + - pdi + - xns + Description_EN: Block list event request + Sample: + - '*' + - test.url.com + - https://example.com:443/gfx/flags/ua.png + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: denyListType + ProductCode: + - pdi + - xns + Description_EN: Block list type + Sample: + - Deny List URL + - Deny List File SHA1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceDirection + ProductCode: + - pdi + - xns + - pds + Description_EN: Device Direction. If the source IP is in the internal network + (the network monitored by Deep Discovery Inspector) it is tagged as + outbound. All other cases are inbound. Internal-to-internal is also tagged + as outbound. + Sample: + - outbound + - inbound + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceMacAddress + ProductCode: + - pdi + - xns + Description_EN: The device mac address + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: devicePayloadId + ProductCode: + - pdi + - xns + Description_EN: The device payload ID + Sample: + - 0:14343219::F:S + - '0:94174860::F:' + - '0:9665982::F:' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceRiskConfidenceLevel + ProductCode: + - pdi + - xns + Description_EN: The confidence level of device risk + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: dmac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The MAC address of the destination IP (dest_ip) + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstGroup + ProductCode: + - pdi + - xns + - mns + Description_EN: The group name defined by the administrator of the destination + Sample: + - Default + - Data Center Services DL_Deployed Block + - Rede Wifi Visitantes-Pacientes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstZone + ProductCode: + - pdi + - xns + Description_EN: The network zone defined by the destination administrator + Sample: + - '1' + - '0' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dvc + ProductCode: + - pdi + - xns + Description_EN: The IP address of the Deep Discover Inspector appliance + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dvchost + ProductCode: + - sao + - pdi + - xns + Description_EN: The computer which installed the Trend Micro product + Sample: + - CU-PRO1-9039-2 + - LTPF32PMNN + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventClass + ProductCode: + - pdi + - xns + Description_EN: The event category + Sample: + - Suspicious Traffic + - Authentication + - Reconnaissance + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubClass + ProductCode: + - pdi + - xns + Description_EN: The category of sub-event class + Sample: + - DNS + - Port Mis-use + - Port Scanning + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileExt + ProductCode: + - pdi + - xns + Description_EN: The file extension of the suspicious file + Sample: + - .lnk + - .exe + - .EXE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileSize + ProductCode: + - pdi + - xns + - sig + - sao + - sfs + - sfc + - sss + Description_EN: The file size of the suspicious file + Sample: + - '0' + - '1255856' + - '1237880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - pdi + - xns + - sig + - sfs + - sfc + - sss + - scs + Description_EN: The file type of the suspicious file + Sample: + - EXE + - LNK + - MIME + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firmalware + ProductCode: + - pdi + - xns + Description_EN: The firmware version of Deep Discover Inspector + Sample: + - 2017-12-01 15:05:07-05:00 3.83.1170 5.0.1555 + - 2020-11-13 18:04:29-05:00 5.0.1555 5.5.1200 + - 2020-11-13 18:43:30-05:00 5.5.1200 5.7.1178 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hasdtasres + ProductCode: + - pdi + - xns + Description_EN: Whether the log contains a report from Virtual Analyzer + Sample: + - No + - Yes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: heurFlag + ProductCode: + - pdi + - xns + Description_EN: Whether it has an Advanced Threat Scan Engine detection + Sample: + - 0 + - 1 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: hostSeverity + ProductCode: + - pdi + - xns + Description_EN: The severity of the threat (specific to the interestedIp) + Sample: + - 1 + - 2 + - 4 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hotFix + ProductCode: + - pdi + - xns + Description_EN: The applied Deep Discover Inspector hotfix version + Sample: + - 2021-07-22 15:08:01+08:00 Hotfix 1042 hfb1042 Apply + - 2021-12-22 09:03:42-06:00 Hotfix 1211 hfb1211 Apply + - 2022-03-30 13:16:28-07:00 Hotfix 1218 hfb1218 Apply + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: interestedGroup + ProductCode: + - pdi + - xns + Description_EN: The network group associated with the user-defined source IP + or destination IP + Sample: + - Default + - Rede DATACENTER Lumen/FORTIGATE - AD ESTACIO CORP + - Data Center Services DL_Deployed Block + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: interestedMacAddress + ProductCode: + - sao + - pdi + - xns + - ptn + Description_EN: The MAC address identified as the log owner's + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ircChannelName + ProductCode: + - pdi + - xns + Description_EN: The IRC channel name + Sample: + - ManageEngine + - unknown + - Global Product Delivery Group + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ircUserName + ProductCode: + - pdi + - xns + Description_EN: The IRC user name + Sample: + - R3 + - ManageEngineCA + - DigiCert TLS RSA SHA256 2020 CA1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malFamily + ProductCode: + - pdi + - xns + - sao + - sds + - sfs + Description_EN: The threat family + Sample: + - EQUATED + - STARTER + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malType + ProductCode: + - pdi + - xns + - sds + - sao + - pds + - sfs + - scs + Description_EN: The risk type for Network Content Correlation Engine rules + Sample: + - OTHERS + - MALWARE + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malTypeGroup + ProductCode: + - pdi + - xns + - sfs + Description_EN: The risk type group for NCCE (Network Content Correlation + Engine) rules. This field comes from NCCP (Network Content Correlation + Pattern) rule type definitions. + Sample: + - Others + - Malware + - Spyware + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mitigationTaskId + ProductCode: + - pdi + - xns + Description_EN: The unique ID to identify the mitigation request + Sample: + - 09dcd06f-2f9c-4bab-8114-f823620fecb6 + - 0ed72c3c-05af-4c16-b2c4-789eaeccb944 + - 0f29cfc3-954a-4fd9-954e-bf14f7253d20 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pAttackPhase + ProductCode: + - pdi + - xns + Description_EN: The category of the primary Attack Phase + Sample: + - Lateral Movement + - Point of Entry + - Asset and Data Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pComp + ProductCode: + - pdi + - xns + - sao + Description_EN: The component that made the detection + Sample: + - CAV + - NCIE + - TMUFE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: peerGroup + ProductCode: + - pdi + - xns + Description_EN: The peer IP group + Sample: + - Default + - Rede DATACENTER Lumen/PALOALTO VPNSSL - VPN CLIENT + - UHS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: potentialRisk + ProductCode: + - pdi + - xns + Description_EN: The tag if it's a potential risk according to heuristics + Sample: + - '1' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rating + ProductCode: + - sao + - pdi + - xns + Description_EN: The credibility level + Sample: + - Safe + - Unknown + - Dangerous + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestClientApplication + ProductCode: + - pdi + - xns + - sds + - sao + Description_EN: The protocol user agent information + Sample: + - Microsoft-Delivery-Optimization/10.0 + - Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) + - example Software GmbH + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskLevel + ProductCode: + - sds + - sao + - sca + - xes + - pdi + - xns + Description_EN: The risk level + Sample: + - '1' + - high + - No Risk + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rozRating + ProductCode: + - pdi + - xns + Description_EN: The VA overall rating + Sample: + - '0' + - '-1' + - '1' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtDate + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The date of the log generation + Sample: + - 1655337600000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rtHour + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The hour of the log generation + Sample: + - 9 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtWeekDay + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The weekday of the log generation + Sample: + - Monday + - Tuesday + - Friday + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sAttackPhase + ProductCode: + - pdi + - xns + Description_EN: The category of the second Attack Phase + Sample: + - Lateral Movement + - Command and Control Communication + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sOSName + ProductCode: + - pdi + - xns + - mns + Description_EN: The source OS + Sample: + - Windows + - Windows 10 + - Windows XP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanTs + ProductCode: + - sca + - sem + - pdi + - xns + Description_EN: The mail scan time + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: score + ProductCode: + - pdi + - xns + - sao + - sca + - ams + - sds + Description_EN: The Web Reputation Services URL rating + Sample: + - 71 + - 81 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: senderGUID + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The sender GUID + Sample: + - 346648FC-9862-D2F0-F94C-FAB1A838ABD7 + - 36E5239E-EEBA-0100-C10E-C057E0455E1D + - 9606BBD5-38A7-9024-83C8-9C88A2AF90CC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: senderIp + ProductCode: + - pdi + - xns + - sao + - sem + Description_EN: The sender IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: smac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The source MAC address + Sample: + - 00:11:22:33:44:55 + - 66:77:88:99:AA:BB + - CC:DD:EE:FF:00:11 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcGroup + ProductCode: + - pdi + - xns + - mns + Description_EN: The group named defined by the source administrator + Sample: + - Default + - Rede DATACENTER example/example - AD example CORP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcZone + ProductCode: + - pdi + - xns + Description_EN: The network zone defined by the source administrator + Sample: + - '1' + - '0' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: threatName + ProductCode: + - sca + - sao + - pdi + - xns + Description_EN: The threat name + Sample: + - Malicious_CnC_access_on_UDP_blocked + - Malicious_CnC_access_on_TCP_blocked + - Other protected file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: threatType + ProductCode: + - pdi + - xns + - sao + - sss + Description_EN: The log threat type + Sample: + - '2' + - '99' + - '5' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vLANId + ProductCode: + - pdi + - xns + - ptn + - mns + Description_EN: The virtual LAN ID + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: overSsl + ProductCode: + - pdi + - xns + - ptp + - stp + Description_EN: Whether the event was triggered by an SSL decryption stream + (Displayed only when SSL Inspection is supported) + Sample: + - Not over SSL/TLS + - '0' + - Over SSL/TLS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mitreMapping + ProductCode: + - pdi + - xns + Description_EN: The MITRE tags + Sample: + - T1090 (TA0011) + - T1071 (TA0011) + - T1071.001 (TA0011) + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ja3Hash + ProductCode: + - pdi + - xns + Description_EN: The fingerprint of an SSL/TLS client application as detected + via a network sensor or device + Sample: + - 72a589da586844d7f0818ce684948eea + - cd08e31494f9531f560d64c695473da9 + - 6dca00d8741247e245e4f2a632f1e62b + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ja3sHash + ProductCode: + - pdi + - xns + Description_EN: The fingerprint of an SSL/TLS server application as detected + via a network sensor or device + Sample: + - e54965894d6b45ecb4323c7ea3d6c115 + - ec74a5c51106f0419184d0dd08fb05bc + - ba1b42efc7dc57bb43bf81de59791c1b + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mitreVersion + ProductCode: + - pdi + - xns + - sds + - pds + Description_EN: The MITRE version + Sample: + - v9 + - v6 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: reportGUID + ProductCode: + - sca + - sfs + - pdi + - xns + Description_EN: The GUID for Workbench to request report page data + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: denyListFileHashSha256 + ProductCode: + - pdi + - xns + Description_EN: The SHA-256 of User-Defined Suspicious Object + Sample: + - 757E5C8823CAA7406030A7E26AED2A2C95D16F69C5A14C884C8CAA72A0C001C3 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pcapUUID + ProductCode: + - pdi + - xns + Description_EN: The PCAP file UUID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: peerEndpointGUID + ProductCode: + - pdi + - xns + - stp + - ptp + Description_EN: The endpoint GUID of the agent peer host + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: rawSrcIp + ProductCode: + - pdi + - xns + Description_EN: The source IP without replacement + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: rawDstIp + ProductCode: + - pdi + - xns + Description_EN: The destination IP without replacement + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: rawSrcPort + ProductCode: + - pdi + - xns + Description_EN: The source port number without replacement + Sample: + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: rawDstPort + ProductCode: + - pdi + - xns + Description_EN: The destination port number without replacement + Sample: + - 33186 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertIssuerCommonName + ProductCode: + - pdi + - xns + Description_EN: The issuer common name + Sample: + - Microsoft Azure TLS Issuing CA 05 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertCommonName + ProductCode: + - pdi + - xns + Description_EN: The subject common name + Sample: + - settings-win.data.microsoft.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertIssuerOrgName + ProductCode: + - pdi + - xns + Description_EN: The issuer organization name + Sample: + - Microsoft Corporation + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertOrgName + ProductCode: + - pdi + - xns + Description_EN: The subject organization name + Sample: + - Microsoft + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: aptCampaigns + ProductCode: + - pdi + - xns + Description_EN: The related APT campaigns + Sample: + - POSSIBLE LSTUDIO + - WEB LURKER + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: threatNames + ProductCode: + - pdi + - xns + Description_EN: The associated threats + Sample: + - HM_GERAL.MIP00000001 + - HM_JADTRE.MIP00000001 + - VAN_BOT.UMXX + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: rawDataStr + ProductCode: &id001 + - pdi + - xns + - scs + - xns + Description_EN: The JSON string that contains additional information + Sample: &id002 + - '{"TLS version": "0x0303", "Cipher Suite": "0xc030"}' + - '{"Scanned ports": "23, 80, 443"}' + - '{"HTTP Content-Type": "application/hal+json", "HTTP Content-Body": "{\\"_links\\": + {\\"type\\": {\\"href\\": \\"http://10.10.10.10/rest/type/node/INVALID_VALUE\\"}}, + \\"type\\": {\\"target_id\\": \\"article\\"}, \\"title\\": {\\"value\\": \\"My + Article\\"}, \\"body\\": {\\"value\\": \\"\\"}}"}' + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rawDataStr + ProductCode: *id001 + Description_EN: The JSON string that contains additional information + Sample: *id002 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: eventTime + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The time the agent or product detected the event + Sample: + - 1657135700000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: request + ProductCode: + - sig + - szn + - pdi + - xns + Description_EN: The destination URL that the user is accessing + Sample: + - https://google.com/ + - https://api/example/v1/testit + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The name of the log event + Sample: + - SWG_ACTIVITY_LOG + - FIREWALL_ACTIVITY_LOG + - VPC_ACTIVITY_LOG + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: clientIp + ProductCode: + - sig + - szn + - pdi + - xns + Description_EN: The endpoint IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: userDomain + ProductCode: + - sig + - pdi + - xns + Description_EN: Active directory domain, domain of username for logging in + TMAS adminportal adminportal + Sample: + - trendmicro.com + DL_Type: string + DL_CommonKey: + - DomainName + - AccountDomain + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sig + - pdi + - xns + Description_EN: The user name or IP address (IPv4) + Sample: + - Sample User Name + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: fileHash + ProductCode: + - sig + - pdi + - xns + Description_EN: The SHA-1 of the file that violated the policy + Sample: + - 1e15bf99022a9164708cebb3eace8fd61ad45cba + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: fileHashSha256 + ProductCode: + - sig + - pdi + - xns + Description_EN: The SHA-256 of the file that violated the policy + Sample: + - ba9edecdd09de1307714564c24409bd25508e22fe11c768053a08f173f263e93 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: fileName + ProductCode: + - sig + - pdi + - xns + Description_EN: The name of the file that violated the policy + Sample: + - word.doc + DL_Type: string + DL_CommonKey: + - FileName + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: fileSize + ProductCode: + - sig + - pdi + - xns + Description_EN: The size of the file that is violating the policy + Sample: + - 12134 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - sig + - pdi + - xns + Description_EN: The type of file which is violating the policy + Sample: + - Microsoft Words + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mimeType + ProductCode: + - sig + - pdi + - xns + Description_EN: The MIME type or content type of the response body + Sample: + - text/html + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestMethod + ProductCode: + - sig + - pdi + - xns + Description_EN: The network protocol request method + Sample: + - POST + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sig + - pdi + - xns + - vpc + - azv + Description_EN: The product name + Sample: + - Secure Web Gateway + - XDR for Cloud - AWS VPC Flow Logs + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - sig + - pdi + - xns + Description_EN: The non-endpoint object such as a network appliance + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: requestMimeType + ProductCode: + - sig + - pdi + - xns + Description_EN: The type of request content + Sample: + - application/json; charset=utf-8 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: tlsJA3Fingerprint + ProductCode: + - sig + - pdi + - xns + Description_EN: The JA3 fingerprint + Sample: + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionStart + ProductCode: + - szn + - pdi + - xns + Description_EN: The session start time (in seconds) + Sample: + - 1575462989 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionEnd + ProductCode: + - szn + - pdi + - xns + Description_EN: The session end time, in seconds + Sample: + - 1575462989 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serverIp + ProductCode: + - pdi + - xns + Description_EN: The server IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: clientPort + ProductCode: + - pdi + - xns + Description_EN: The client port number + Sample: + - 5566 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: serverPort + ProductCode: + - pdi + - xns + Description_EN: The server port number + Sample: + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: clientMAC + ProductCode: + - pdi + - xns + Description_EN: The client MAC address + Sample: + - 00-00-00-ff-ff-ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serverMAC + ProductCode: + - pdi + - xns + Description_EN: The server MAC address + Sample: + - 00-00-00-ff-ff-ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: flowId + ProductCode: + - pdi + - xns + Description_EN: The network analysis flow ID + Sample: + - '6837014561409730558' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: status + ProductCode: + - pdi + - xns + Description_EN: The network analysis flow session status + Sample: + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: app + ProductCode: + - pdi + - xns + Description_EN: The network protocol + Sample: + - HTTP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: httpReferer + ProductCode: + - pdi + - xns + Description_EN: The HTTP referrer header + Sample: + - www.google.com.tw + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: httpXForwardedFor + ProductCode: + - pdi + - xns + Description_EN: The HTTP X-Forwarded-For header + Sample: + - 10.10.10.10, 10.10.10.11, 10.10.10.12 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestClientApplication + ProductCode: + - pdi + - xns + Description_EN: The HTTP user agent + Sample: + - Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) + Chrome/61.0.3163.100 Safari/537.36 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestDate + ProductCode: + - pdi + - xns + Description_EN: The HTTP date header + Sample: + - Fri, 20 Oct 2017 06:02:09 GMT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestHeaders + ProductCode: + - pdi + - xns + Description_EN: All HTTP headers without sensitive information + Sample: + - "Host: 10.10.10.10:8080\r\nUser-Agent: curl/7.78.0\r\nAccept: */*\r\n" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: overSsl + ProductCode: + - pdi + - xns + Description_EN: SSL protocol connection + Sample: + - YES + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: respCode + ProductCode: + - pdi + - xns + Description_EN: The network protocol response code + Sample: + - '200' + - '25' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: respDate + ProductCode: + - pdi + - xns + Description_EN: The HTTP response date header + Sample: + - Fri, 20 Oct 2017 06:02:09 GMT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: httpLocation + ProductCode: + - pdi + - xns + Description_EN: The HTTP location header + Sample: + - www.google.com.tw + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: respHeaders + ProductCode: + - pdi + - xns + Description_EN: All HTTP response headers without sensitive information + Sample: + - "Accept-Ranges: bytes\r\nContent-Length: 68\r\nContent-Type: - text/plain; charset=utf-8\r\ + \ \nLast-Modified: Thu, 19 Aug 2021 06:23:54 GMT\r\nDate: Thu, 19 Aug 2021 06:24:00 + GMT\r\n" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: respFileHash + ProductCode: + - pdi + - xns + Description_EN: The SHA-1 of the file detected in the response direction + Sample: + - f17d9c55dea88f9aec8f74363f01e918cffb4142 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: respFileHashSha256 + ProductCode: + - pdi + - xns + Description_EN: The SHA-256 of the file detected in the response direction + Sample: + - 5ad4396d67f0c9d54572f051e28e9e62f4010c269a953d25259b17ad5fab4fd5 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: respFileType + ProductCode: + - pdi + - xns + Description_EN: The file type detected in the response direction + Sample: + - PKZIP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: respArchFiles + ProductCode: + - pdi + - xns + Description_EN: The file information extracted from files detected in response + direction + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: httpXForwardedForIp + ProductCode: + - pdi + - xns + Description_EN: The x-forwarded-for IP used by the network appliance + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: httpXForwardedForPort + ProductCode: + - pdi + - xns + Description_EN: The patched HTTP server port when the network appliance + selects an x-forwarded-for IP address to use + Sample: + - 65535 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: resolvedUrlIp + ProductCode: + - pdi + - xns + Description_EN: The IP address of the FQDN + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: resolvedUrlPort + ProductCode: + - pdi + - xns + Description_EN: The HTTP server port + Sample: + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: false +- Name: respMethod + ProductCode: + - pdi + - xns + Description_EN: The response method + Sample: + - KRB_ERROR + - AS_REP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: msgId + ProductCode: + - pdi + - xns + Description_EN: The service provider message ID + Sample: + - + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgSubject + ProductCode: + - pdi + - xns + Description_EN: The email subject + Sample: + - test + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: false +- Name: suser + ProductCode: + - pdi + - xns + Description_EN: The email sender + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: false +- Name: duser + ProductCode: + - pdi + - xns + Description_EN: The email recipient + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: requests + ProductCode: + - pdi + - xns + Description_EN: The URLs of the request + Sample: + - www.google.com.tw + DL_Type: dynamic + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: direction + ProductCode: + - pdi + - xns + Description_EN: The object transfer direction + Sample: + - Download + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: archFiles + ProductCode: + - pdi + - xns + Description_EN: The file information extracted from detected files + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hostName + ProductCode: + - pdi + - xns + Description_EN: The host name + Sample: + - NJ-EFFY-ZHAO1 + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: tlsSelectedCipher + ProductCode: + - pdi + - xns + Description_EN: The selected cipher of the TLS protocol + Sample: + - c02f + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertCommonName + ProductCode: + - pdi + - xns + Description_EN: The certificate common name + Sample: + - '*.www.sample.com' + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertIssuer + ProductCode: + - pdi + - xns + Description_EN: The issuer of the certificate + Sample: + - /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance + Server CA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertValidFrom + ProductCode: + - pdi + - xns + Description_EN: The certificate validity start time + Sample: + - '2014-11-21T02:43:28' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertValidUntil + ProductCode: + - pdi + - xns + Description_EN: The certificate validity end time + Sample: + - '2018-11-21T02:43:28' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertSerialNumber + ProductCode: + - pdi + - xns + Description_EN: The certificate serial number + Sample: + - 0888b1ad2a593310593f47565a5a5a4a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertSANs + ProductCode: + - pdi + - xns + Description_EN: The Subject Alternative Name of the certificate + Sample: + - '*.www.sample.com' + - add.my.sample.com + - au.sample.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertFingerprint + ProductCode: + - pdi + - xns + Description_EN: The certificate fingerprint + Sample: + - 3914af80223c833f26df001cbf342eff8a31aba1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ja3Hash + ProductCode: + - pdi + - xns + Description_EN: The JA3 hash + Sample: + - 478e74fad764c966f19c5232c7cdfc5a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ja3sHash + ProductCode: + - pdi + - xns + Description_EN: The JA3S hash + Sample: + - 6d37fb1b3306d6e9f875650d8eb74b4f + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: tlsJA3SFingerprint + ProductCode: + - pdi + - xns + Description_EN: The raw JA3S + Sample: + - 771,157,65281-15 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ftpTrans + ProductCode: + - pdi + - xns + Description_EN: The transaction information of the FTP protocol + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dnsQueryType + ProductCode: + - pdi + - xns + Description_EN: The record type requested by the DNS protocol + Sample: + - A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectIps + ProductCode: + - pdi + - xns + Description_EN: The IP address resolved by the DNS protocol + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: reqAppVersion + ProductCode: + - xns + - pdi + Description_EN: The client application version number + Sample: + - SSH-2.0-OPENSSH_9.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: respAppVersion + ProductCode: + - xns + - pdi + Description_EN: The server application version number + Sample: + - SSH-2.0-OPENSSH_8.7 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: reqScannedBytes + ProductCode: + - pdi + - xns + Description_EN: The data volume transmitted by the client (in bytes) + Sample: + - 4655 + DL_Type: string + DL_Searchable: true +- Name: respScannedBytes + ProductCode: + - pdi + - xns + Description_EN: The data volume transmitted by the server (in bytes) + Sample: + - 6654 + DL_Type: string + DL_Searchable: true +- Name: reqDataSize + ProductCode: + - xns + - pdi + Description_EN: The data volume transmitted over the transport layer by the + client (in bytes) + Sample: + - 15688 + DL_Type: string + DL_Searchable: true +- Name: respDataSize + ProductCode: + - xns + - pdi + Description_EN: The data volume transmitted over the transport layer by the + server (in bytes) + Sample: + - 7856 + DL_Type: string + DL_Searchable: true +- Name: clientGroup + ProductCode: + - xns + - pdi + Description_EN: The client IP network group + Sample: + - myCompany + - myGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: serverGroup + ProductCode: + - xns + - pdi + Description_EN: The server IP network group + Sample: + - myCompany + - myGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: httpXForwardedForGroup + ProductCode: + - xns + - pdi + Description_EN: The X-Forwarded-For IP network group + Sample: + - myCompany + - myGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: resolvedUrlGroup + ProductCode: + - xns + - pdi + Description_EN: The IP address FQDN network group + Sample: + - myCompany + - myGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: clientHost + ProductCode: + - xns + Description_EN: The client IP host name + Sample: + - sample.test.com + - sample.tw.test.org + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serverHost + ProductCode: + - xns + Description_EN: The server IP host name + Sample: + - sample.test.com + - sample.tw.test.org + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: httpXForwardedForHost + ProductCode: + - xns + Description_EN: The X-Forwarded-For IP host name + Sample: + - sample.test.com + - sample.tw.test.org + DL_Type: string + DL_Searchable: true + DL_Aggregable: false +- Name: rawDataStr + ProductCode: + - pdi + - xns + Description_EN: The raw data string that contains additional information + Sample: + - '[{ "oid": "1.2.3.4", "value_type": 4, "value": "MANUFACTURER:SAMPLE\ nMODEL:SAMPLE + C1234", "parse": 1}]' + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: dvc + ProductCode: + - pdi + - xns + Description_EN: The IP address of the Deep Discovery Inspector or Virtual + Network Sensor appliance + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dvchost + ProductCode: + - pdi + - xns + Description_EN: The network device hostname + Sample: + - my-company-xns + - my-ddi + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - xns + - pdi + - vpc + - azv + Description_EN: The event ID + Sample: + - '200139' + - '200140' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: sessionEndReason + ProductCode: + - xns + - pdi + Description_EN: The reason why a session was terminated + Sample: + - tcp-fin + - tcp-rst-from-server + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Network/Palo Alto Firewall.yaml b/doc_v2/Network/Palo Alto Firewall.yaml new file mode 100644 index 0000000..7e03fb5 --- /dev/null +++ b/doc_v2/Network/Palo Alto Firewall.yaml @@ -0,0 +1,69 @@ +- Name: fileHashMd5 + ProductCode: + - qpf + Description_EN: The MD5 of the file + Sample: + - d5120786925038601a77c2e1eB9a3a0a + DL_Type: string + DL_CommonKey: + - FileMD5 + DL_Searchable: true + DL_Aggregable: false +- Name: requestMethod + ProductCode: + - qpf + Description_EN: The network protocol request method + Sample: + - POST + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: sUser1 + ProductCode: + - qpf + Description_EN: The latest sign-in user of the source + Sample: + - 000c29edef58 + - sample.com\ser-desktopcentral + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: dUser1 + ProductCode: + - qpf + Description_EN: The latest logon user of the destination + Sample: + - dhr\m42svc + - altsvc + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: shost + ProductCode: + - qpf + Description_EN: The source hostname + Sample: + - sw_us-east-1a_10-124-17-69 + - sw_us-east-1c_10-124-21-139 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: dhost + ProductCode: + - qpf + Description_EN: The destination hostname + Sample: + - sw_us-east-1c_10-124-21-139 + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Network/TippingPoint Security Management System.yaml b/doc_v2/Network/TippingPoint Security Management System.yaml new file mode 100644 index 0000000..49ed156 --- /dev/null +++ b/doc_v2/Network/TippingPoint Security Management System.yaml @@ -0,0 +1,558 @@ +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: category + ProductCode: + - ptp + - mns + - sds + Description_EN: The event category + Sample: + - Exploits + - Reconnaissance + - Vulnerabilities + - Security Policy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: interestedIp + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - ptn + Description_EN: The IP of the interestedHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: endpointIp + ProductCode: + - sds + - pds + - sao + - ptp + - stp + - ptn + - sss + - ddr + Description_EN: The IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: policyId + ProductCode: + - ptp + - sao + - xes + - stp + - sds + - pds + - scs + Description_EN: The policy ID of which the event was detected + Sample: + - 00000001-0001-0001-0001-000000007610 + - '007' + - '003' + - TM000001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - pdi + - xns + - sao + - ptp + - xes + - stp + - sig + Description_EN: The GUID of the agent which reported the detection + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: cves + ProductCode: + - ptp + - sds + - pdi + - xns + Description_EN: The CVEs associated with this filter + Sample: + - CVE-2014-3567 + - CVE-2016-6304 + - CVE-2011-1385 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpname + ProductCode: + - sds + - sao + - pds + - ptp + - xes + - stp + Description_EN: The management product name + Sample: + - Cloud One - Workload Security + - Apex Central + - Deep Security Software + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: ruleUuid + ProductCode: + - ptp + - stp + - sca + - szn + Description_EN: The signature UUID from the DV (Digital Vaccine) + Sample: + - 00000001-0001-0001-0001-000000007610 + - 00000001-0001-0001-0001-000000007120 + - 00000001-0001-0001-0001-000000017056 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: overSsl + ProductCode: + - pdi + - xns + - ptp + - stp + Description_EN: Whether the event was triggered by an SSL decryption stream + (Displayed only when SSL Inspection is supported) + Sample: + - Not over SSL/TLS + - '0' + - Over SSL/TLS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: peerEndpointGUID + ProductCode: + - pdi + - xns + - stp + - ptp + Description_EN: The endpoint GUID of the agent peer host + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleSetName + ProductCode: + - scs + - stp + - ptp + - sds + Description_EN: The rule set name + Sample: + - AllRules + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Network/Trend Cloud One - Network Security.yaml b/doc_v2/Network/Trend Cloud One - Network Security.yaml new file mode 100644 index 0000000..49e0c0a --- /dev/null +++ b/doc_v2/Network/Trend Cloud One - Network Security.yaml @@ -0,0 +1,588 @@ +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: interestedIp + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - ptn + Description_EN: The IP of the interestedHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: endpointIp + ProductCode: + - sds + - pds + - sao + - ptp + - stp + - ptn + - sss + - ddr + Description_EN: The IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: subRuleId + ProductCode: + - sds + - pds + - stp + Description_EN: ID of a subordinate rule + Sample: + - '85262' + - '914520' + - '18152' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyId + ProductCode: + - ptp + - sao + - xes + - stp + - sds + - pds + - scs + Description_EN: The policy ID of which the event was detected + Sample: + - 00000001-0001-0001-0001-000000007610 + - '007' + - '003' + - TM000001 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - pdi + - xns + - sao + - ptp + - xes + - stp + - sig + Description_EN: The GUID of the agent which reported the detection + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mpname + ProductCode: + - sds + - sao + - pds + - ptp + - xes + - stp + Description_EN: The management product name + Sample: + - Cloud One - Workload Security + - Apex Central + - Deep Security Software + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: ruleUuid + ProductCode: + - ptp + - stp + - sca + - szn + Description_EN: The signature UUID from the DV (Digital Vaccine) + Sample: + - 00000001-0001-0001-0001-000000007610 + - 00000001-0001-0001-0001-000000007120 + - 00000001-0001-0001-0001-000000017056 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: overSsl + ProductCode: + - pdi + - xns + - ptp + - stp + Description_EN: Whether the event was triggered by an SSL decryption stream + (Displayed only when SSL Inspection is supported) + Sample: + - Not over SSL/TLS + - '0' + - Over SSL/TLS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: peerEndpointGUID + ProductCode: + - pdi + - xns + - stp + - ptp + Description_EN: The endpoint GUID of the agent peer host + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleSetName + ProductCode: + - scs + - stp + - ptp + - sds + Description_EN: The rule set name + Sample: + - AllRules + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Network/Trend Micro Deep Discovery Inspector.yaml b/doc_v2/Network/Trend Micro Deep Discovery Inspector.yaml new file mode 100644 index 0000000..84c7f7a --- /dev/null +++ b/doc_v2/Network/Trend Micro Deep Discovery Inspector.yaml @@ -0,0 +1,3515 @@ +- Name: filterRiskLevel + ProductCode: + - ALL + - pdi + - xns + Description_EN: The top level filter risk of the event + Sample: + - info + - low + - medium + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: hostName + ProductCode: + - pdi + - xns + - sds + - pds + - ptn + Description_EN: The computer name of the client host (The hostname from the + suspicious URL detected by Deep Discovery Inspector) + Sample: + - Let's Encrypt + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: interestedHost + ProductCode: + - sds + - pdi + - xns + - pds + - sao + Description_EN: The endpoint hostname (For example, if an intranet host + accesses a suspicious internet host, the intranet host is the "peerHost" and + the internet host is the "interestedHost") + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - es-dtc-w-dc02.example.corp + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: true +- Name: shost + ProductCode: + - sds + - pdi + - xns + - pds + - mns + Description_EN: The source hostname + Sample: + - dns.google + - sw_us-east-1a_10-124-17-69 + - sw_us-east-1c_10-124-21-139 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: dhost + ProductCode: + - pdi + - xns + - mns + Description_EN: The destination hostname + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: denyListHost + ProductCode: + - pdi + - xns + Description_EN: The domain of the Virtual Analyzer Suspicious Object + Sample: + - www.example.dns01.com + - example.com + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: botUrl + ProductCode: + - pdi + - xns + Description_EN: The bot URL + Sample: + - 7?01 + - '0000' + - indows + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDestination + ProductCode: + - pdi + - xns + Description_EN: The destination domain, IP, URL, or recipient + Sample: + - 10.10.10.10:443 + - www.example.dns04.com + - example.ru + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: interestedIp + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - ptn + Description_EN: The IP of the interestedHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: peerIp + ProductCode: + - pdi + - xns + - sao + Description_EN: The IP of peerHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: denyListIp + ProductCode: + - pdi + - xns + Description_EN: The IP of the Virtual Analyzer Suspicious Object + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: compressedFileName + ProductCode: + - pdi + - xns + - sao + - sfs + - sfc + - sds + - sss + - scs + Description_EN: The file name of the compressed file + Sample: + - /proc/32058/fd/150 + - NONAMEFL + - /proc/10006/fd/30 + - VirusActionSample/RPF2_OtherMalwareSample-other.exe + DL_Type: string + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileName + ProductCode: + - sca + - sem + - pdi + - xns + - xms + Description_EN: The file name of an attachment + Sample: + - Mail Body + - image001.png + - image002.png + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: filePath + ProductCode: + - sds + - pds + - sao + - pdi + - xns + - pts + - sfs + - sfc + Description_EN: The file path without the file name + Sample: + - security + - /var/log/audit/audit.log + - application + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: filePathName + ProductCode: + - sds + - pdi + - xns + - pds + - pts + Description_EN: The file path with the file name + Sample: + - vss + - spoolss + - /etc/hosts + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: attachmentFileHash + ProductCode: + - pdi + - xns + - xms + Description_EN: The SHA-1 of the email attachment + Sample: + - C9877617DB6715792F9D5C959C1E8D4E56D0C281 + - 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722 + - 0E56D9540B07ED15EF745348D35C72A6A00A0BD9 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHash + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-1 of the decompressed archive + Sample: + - 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA + - FA71B59F35F0EE44D27F74917EF5A0DA2797E80B + - 14D2302172EB81465CE12E01361AE24CDE170F7B + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: denyListFileHash + ProductCode: + - pdi + - xns + Description_EN: The SHA-1 of the Virtual Analyzer Suspicious Object + Sample: + - 746C4D6048A409F33446463B28CA21CB2C5DD941 + - DAA66CE3C1F08144885BB0E99837030C5231DE60 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileHashSha256 + ProductCode: + - pdi + - xns + - sem + Description_EN: The SHA-256 of the attached file (attachementFileName) + Sample: + - D81D4C14DDEB8CA390FFADA69265AAD46CDEDD72CDD332CB8AA17D924626B397 + - 01DE1FC697D2D0850F0468474A3E1E0BF4D78B23F0633908CF82E504E0DCBFF9 + - 02D16D9970AB635A7B05C3A268E23F5B41C419DD022F1054E9FD912BE130BDB0 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileHashSha256 + ProductCode: + - pdi + - xns + - sfs + - sfc + - sds + - sao + - sss + Description_EN: The SHA-256 of the compressed suspicious file + Sample: + - 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F + - 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE + - 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: suser + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email sender + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: true +- Name: duser + ProductCode: + - sds + - pds + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The email recipient + Sample: + - (no user) + - SYSTEM + - ' SYSTEM' + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: true +- Name: mailMsgSubject + ProductCode: + - sca + - pdi + - xns + - sem + - sao + - xms + Description_EN: The email subject + Sample: + - FW. mail subject + - ManageEngine + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: true +- Name: msgId + ProductCode: + - sca + - sem + - pdi + - xns + - sao + - xms + Description_EN: The internet message ID + Sample: + - 66.6.00.0006 + - example.test.com + - dameware1svr + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: false +- Name: techniqueId + ProductCode: + - pts + - pdi + - xns + Description_EN: Technique ID detected by the product agent base on a detection + rule + Sample: [] + DL_Type: dynamic + DL_CommonKey: + - Technique + DL_Searchable: true + DL_Aggregable: false +- Name: tags + ProductCode: + - ALL + - sds + - sao + - pdi + - xns + Description_EN: The detected technique ID based on the alert filter + Sample: + - MITREV9.T1090 + - MITRE.T1071 + - MITREV9.T1059.001 + DL_Type: dynamic + DL_CommonKey: + - Technique + - Tactic + DL_Searchable: true + DL_Aggregable: true +- Name: tacticId + ProductCode: + - pdi + - xns + - xes + - sao + Description_EN: The list of MITRE tactic IDs + Sample: + - TA0011 + - TA0008 + - TA0001 + DL_Type: dynamic + DL_CommonKey: + - Tactic + DL_Searchable: true + DL_Aggregable: false +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleId + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - mns + Description_EN: The rule ID + Sample: + - 1002795 + - 1003802 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - pdi + - xns + - sao + - ptp + - xes + - stp + - sig + Description_EN: The GUID of the agent which reported the detection + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: isHidden + ProductCode: + - pdi + - xns + - sao + Description_EN: Whether the detection log generated a grey rule match + Sample: + - Yes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: severity + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - scs + - mns + Description_EN: The severity of the event + Sample: + - 2 + - 4 + - 6 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: domainName + ProductCode: + - pdi + - xns + - sao + - sca + Description_EN: The detected domain name + Sample: + - http://10.10.10.10 + - example.domain.com + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: peerHost + ProductCode: + - pdi + - xns + Description_EN: The hostname of peerIp + Sample: + - dns.google + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + DL_Searchable: true + DL_Aggregable: false +- Name: httpReferer + ProductCode: + - pdi + - xns + - sds + - sao + Description_EN: The HTTP referer + Sample: + - http://172.16.58.233/ + - http://example/page1/ + - https://www.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: data1 + ProductCode: + - pdi + - xns + Description_EN: The Deep Discover Inspector correlation log metadata + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: targetShare + ProductCode: + - pdi + - xns + Description_EN: 'For HTTPS protocol: Subject State or Province Name; For SMB protocol: + Shared folder' + Sample: + - 3MHIS + - NETLOGON + - CA + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: botCmd + ProductCode: + - pdi + - xns + Description_EN: The bot command + Sample: + - '1068' + - indows + - chrome.exe + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: dUser1 + ProductCode: + - pdi + - xns + Description_EN: The latest sign-in user of the destination + Sample: + - user\example + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: sUser1 + ProductCode: + - pdi + - xns + Description_EN: The latest sign-in user of the source + Sample: + - example\admin + - example.us.com\account + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: cve + ProductCode: + - pdi + - xns + Description_EN: The CVE identifier + Sample: + - MS17-010 + - CVE-2021-45046 + - CVE-2021-44228 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cves + ProductCode: + - ptp + - sds + - pdi + - xns + Description_EN: The CVEs associated with this filter + Sample: + - CVE-2014-3567 + - CVE-2016-6304 + - CVE-2011-1385 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - pdi + - xns + - sws + - sao + - sig + - sca + - ams + - sds + Description_EN: The requested URL category + Sample: + - Untested + - '158' + - Web Advertisement + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appGroup + ProductCode: + - pdi + - xns + Description_EN: The app category of the event + Sample: + - DNS Response + - HTTP + - CIFS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aptRelated + ProductCode: + - pdi + - xns + Description_EN: The event is related to an APT + Sample: + - '0' + - '1' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileSize + ProductCode: + - pdi + - xns + - xms + Description_EN: The file size of the email attachment + Sample: + - '190843' + - '104454' + - '112197' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: attachmentFileType + ProductCode: + - pdi + - xns + Description_EN: The file type of the email attachment + Sample: + - PDF + - TEXT + - PKZIP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDestinationFormat + ProductCode: + - pdi + - xns + Description_EN: C&C server access format + Sample: + - IP_DOMAIN + - URL + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDetection + ProductCode: + - sao + - pdi + - xns + Description_EN: Is this log identified as a C&C callback address detection + Sample: + - Yes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaDetectionSource + ProductCode: + - sao + - pdi + - xns + Description_EN: Which list defines this CCCA detection rule + Sample: + - CCCA_GLOBAL_LIST (0) + - GLOBAL_INTELLIGENCE + - USER_DEFINED + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cccaRiskLevel + ProductCode: + - sao + - pdi + - xns + Description_EN: The severity level of the threat actors associated with the + C&C servers + Sample: + - 0 + - 1 + - 2 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientFlag + ProductCode: + - pdi + - xns + Description_EN: Whether the client is a source or destination + Sample: + - dst + - src + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cnt + ProductCode: + - pdi + - xns + - ptn + - mns + Description_EN: The total number of logs + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileSize + ProductCode: + - pdi + - xns + - sfs + - sfc + Description_EN: The file size of the decompressed archive file + Sample: + - '0' + - '265314' + - '175864' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: compressedFileType + ProductCode: + - pdi + - xns + - sfs + - sfc + - sss + Description_EN: The file type of the decompressed archive file + Sample: + - EXE + - JAVA + - PDF + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: correlationCat + ProductCode: + - pdi + - xns + Description_EN: The correlation category + Sample: + - Suspicious Traffic + - Authentication + - Reconnaissance + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: dOSName + ProductCode: + - pdi + - xns + - mns + Description_EN: The destination host OS + Sample: + - Windows + - Windows 10 + - Android + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data0 + ProductCode: + - pdi + - xns + Description_EN: The value of the DDI Correlation log + Sample: + - '1' + - USR_SUSPICIOUS_IP.UMXX + - USR_SUSPICIOUS_URL.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data0Name + ProductCode: + - pdi + - xns + Description_EN: The name of the DDI Correlation log + Sample: + - Malware Name + - Attacked this IP + - IP Address under Attack + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data1Name + ProductCode: + - pdi + - xns + Description_EN: The name of the DDI Correlation log + Sample: + - Port Used + - Malicious File Transferred To This IP Address + - Malware Server IP Address + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data2 + ProductCode: + - pdi + - xns + Description_EN: The value of the DDI Correlation log + Sample: + - '1' + - '10003' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data2Name + ProductCode: + - pdi + - xns + Description_EN: The name of the DDI Correlation log + Sample: + - Number of Malware Files Downloaded + - Protocol + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data3 + ProductCode: + - pdi + - xns + Description_EN: The value of the DDI Correlation log + Sample: + - '1' + - 10.10.10.10 + - '23903' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: data4 + ProductCode: + - pdi + - xns + Description_EN: The value of the DDI Correlation log + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dceHash1 + ProductCode: + - pdi + - xns + Description_EN: The Trend Micro Threat Mitigation Server requires the log, but + the Trend Micro Threat Mitigation Server is EOL. + Sample: + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dceHash2 + ProductCode: + - pdi + - xns + Description_EN: The Trend Micro Threat Mitigation Server requires the log, but + the Trend Micro Threat Mitigation Server is EOL. + Sample: + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: denyListRequest + ProductCode: + - pdi + - xns + Description_EN: Block list event request + Sample: + - '*' + - test.url.com + - https://example.com:443/gfx/flags/ua.png + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: denyListType + ProductCode: + - pdi + - xns + Description_EN: Block list type + Sample: + - Deny List URL + - Deny List File SHA1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceDirection + ProductCode: + - pdi + - xns + - pds + Description_EN: Device Direction. If the source IP is in the internal network + (the network monitored by Deep Discovery Inspector) it is tagged as + outbound. All other cases are inbound. Internal-to-internal is also tagged + as outbound. + Sample: + - outbound + - inbound + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceMacAddress + ProductCode: + - pdi + - xns + Description_EN: The device mac address + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: devicePayloadId + ProductCode: + - pdi + - xns + Description_EN: The device payload ID + Sample: + - 0:14343219::F:S + - '0:94174860::F:' + - '0:9665982::F:' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceRiskConfidenceLevel + ProductCode: + - pdi + - xns + Description_EN: The confidence level of device risk + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: dmac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The MAC address of the destination IP (dest_ip) + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstGroup + ProductCode: + - pdi + - xns + - mns + Description_EN: The group name defined by the administrator of the destination + Sample: + - Default + - Data Center Services DL_Deployed Block + - Rede Wifi Visitantes-Pacientes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstZone + ProductCode: + - pdi + - xns + Description_EN: The network zone defined by the destination administrator + Sample: + - '1' + - '0' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dvc + ProductCode: + - pdi + - xns + Description_EN: The IP address of the Deep Discover Inspector appliance + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dvchost + ProductCode: + - sao + - pdi + - xns + Description_EN: The computer which installed the Trend Micro product + Sample: + - CU-PRO1-9039-2 + - LTPF32PMNN + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventClass + ProductCode: + - pdi + - xns + Description_EN: The event category + Sample: + - Suspicious Traffic + - Authentication + - Reconnaissance + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubClass + ProductCode: + - pdi + - xns + Description_EN: The category of sub-event class + Sample: + - DNS + - Port Mis-use + - Port Scanning + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileExt + ProductCode: + - pdi + - xns + Description_EN: The file extension of the suspicious file + Sample: + - .lnk + - .exe + - .EXE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileSize + ProductCode: + - pdi + - xns + - sig + - sao + - sfs + - sfc + - sss + Description_EN: The file size of the suspicious file + Sample: + - '0' + - '1255856' + - '1237880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - pdi + - xns + - sig + - sfs + - sfc + - sss + - scs + Description_EN: The file type of the suspicious file + Sample: + - EXE + - LNK + - MIME + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firmalware + ProductCode: + - pdi + - xns + Description_EN: The firmware version of Deep Discover Inspector + Sample: + - 2017-12-01 15:05:07-05:00 3.83.1170 5.0.1555 + - 2020-11-13 18:04:29-05:00 5.0.1555 5.5.1200 + - 2020-11-13 18:43:30-05:00 5.5.1200 5.7.1178 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hasdtasres + ProductCode: + - pdi + - xns + Description_EN: Whether the log contains a report from Virtual Analyzer + Sample: + - No + - Yes + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: heurFlag + ProductCode: + - pdi + - xns + Description_EN: Whether it has an Advanced Threat Scan Engine detection + Sample: + - 0 + - 1 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: hostSeverity + ProductCode: + - pdi + - xns + Description_EN: The severity of the threat (specific to the interestedIp) + Sample: + - 1 + - 2 + - 4 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hotFix + ProductCode: + - pdi + - xns + Description_EN: The applied Deep Discover Inspector hotfix version + Sample: + - 2021-07-22 15:08:01+08:00 Hotfix 1042 hfb1042 Apply + - 2021-12-22 09:03:42-06:00 Hotfix 1211 hfb1211 Apply + - 2022-03-30 13:16:28-07:00 Hotfix 1218 hfb1218 Apply + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: interestedGroup + ProductCode: + - pdi + - xns + Description_EN: The network group associated with the user-defined source IP + or destination IP + Sample: + - Default + - Rede DATACENTER Lumen/FORTIGATE - AD ESTACIO CORP + - Data Center Services DL_Deployed Block + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: interestedMacAddress + ProductCode: + - sao + - pdi + - xns + - ptn + Description_EN: The MAC address identified as the log owner's + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ircChannelName + ProductCode: + - pdi + - xns + Description_EN: The IRC channel name + Sample: + - ManageEngine + - unknown + - Global Product Delivery Group + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ircUserName + ProductCode: + - pdi + - xns + Description_EN: The IRC user name + Sample: + - R3 + - ManageEngineCA + - DigiCert TLS RSA SHA256 2020 CA1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malFamily + ProductCode: + - pdi + - xns + - sao + - sds + - sfs + Description_EN: The threat family + Sample: + - EQUATED + - STARTER + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malType + ProductCode: + - pdi + - xns + - sds + - sao + - pds + - sfs + - scs + Description_EN: The risk type for Network Content Correlation Engine rules + Sample: + - OTHERS + - MALWARE + - Others + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malTypeGroup + ProductCode: + - pdi + - xns + - sfs + Description_EN: The risk type group for NCCE (Network Content Correlation + Engine) rules. This field comes from NCCP (Network Content Correlation + Pattern) rule type definitions. + Sample: + - Others + - Malware + - Spyware + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mitigationTaskId + ProductCode: + - pdi + - xns + Description_EN: The unique ID to identify the mitigation request + Sample: + - 09dcd06f-2f9c-4bab-8114-f823620fecb6 + - 0ed72c3c-05af-4c16-b2c4-789eaeccb944 + - 0f29cfc3-954a-4fd9-954e-bf14f7253d20 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pAttackPhase + ProductCode: + - pdi + - xns + Description_EN: The category of the primary Attack Phase + Sample: + - Lateral Movement + - Point of Entry + - Asset and Data Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pComp + ProductCode: + - pdi + - xns + - sao + Description_EN: The component that made the detection + Sample: + - CAV + - NCIE + - TMUFE + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: peerGroup + ProductCode: + - pdi + - xns + Description_EN: The peer IP group + Sample: + - Default + - Rede DATACENTER Lumen/PALOALTO VPNSSL - VPN CLIENT + - UHS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: potentialRisk + ProductCode: + - pdi + - xns + Description_EN: The tag if it's a potential risk according to heuristics + Sample: + - '1' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rating + ProductCode: + - sao + - pdi + - xns + Description_EN: The credibility level + Sample: + - Safe + - Unknown + - Dangerous + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestClientApplication + ProductCode: + - pdi + - xns + - sds + - sao + Description_EN: The protocol user agent information + Sample: + - Microsoft-Delivery-Optimization/10.0 + - Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) + - example Software GmbH + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: riskLevel + ProductCode: + - sds + - sao + - sca + - xes + - pdi + - xns + Description_EN: The risk level + Sample: + - '1' + - high + - No Risk + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rozRating + ProductCode: + - pdi + - xns + Description_EN: The VA overall rating + Sample: + - '0' + - '-1' + - '1' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtDate + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The date of the log generation + Sample: + - 1655337600000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rtHour + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The hour of the log generation + Sample: + - 9 + - 8 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rtWeekDay + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The weekday of the log generation + Sample: + - Monday + - Tuesday + - Friday + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sAttackPhase + ProductCode: + - pdi + - xns + Description_EN: The category of the second Attack Phase + Sample: + - Lateral Movement + - Command and Control Communication + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sOSName + ProductCode: + - pdi + - xns + - mns + Description_EN: The source OS + Sample: + - Windows + - Windows 10 + - Windows XP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: scanTs + ProductCode: + - sca + - sem + - pdi + - xns + Description_EN: The mail scan time + Sample: [] + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: score + ProductCode: + - pdi + - xns + - sao + - sca + - ams + - sds + Description_EN: The Web Reputation Services URL rating + Sample: + - 71 + - 81 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: senderGUID + ProductCode: + - sds + - pdi + - xns + - sao + - pds + Description_EN: The sender GUID + Sample: + - 346648FC-9862-D2F0-F94C-FAB1A838ABD7 + - 36E5239E-EEBA-0100-C10E-C057E0455E1D + - 9606BBD5-38A7-9024-83C8-9C88A2AF90CC + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: senderIp + ProductCode: + - pdi + - xns + - sao + - sem + Description_EN: The sender IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: smac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The source MAC address + Sample: + - 00:11:22:33:44:55 + - 66:77:88:99:AA:BB + - CC:DD:EE:FF:00:11 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcGroup + ProductCode: + - pdi + - xns + - mns + Description_EN: The group named defined by the source administrator + Sample: + - Default + - Rede DATACENTER example/example - AD example CORP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcZone + ProductCode: + - pdi + - xns + Description_EN: The network zone defined by the source administrator + Sample: + - '1' + - '0' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: threatName + ProductCode: + - sca + - sao + - pdi + - xns + Description_EN: The threat name + Sample: + - Malicious_CnC_access_on_UDP_blocked + - Malicious_CnC_access_on_TCP_blocked + - Other protected file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: threatType + ProductCode: + - pdi + - xns + - sao + - sss + Description_EN: The log threat type + Sample: + - '2' + - '99' + - '5' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vLANId + ProductCode: + - pdi + - xns + - ptn + - mns + Description_EN: The virtual LAN ID + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: overSsl + ProductCode: + - pdi + - xns + - ptp + - stp + Description_EN: Whether the event was triggered by an SSL decryption stream + (Displayed only when SSL Inspection is supported) + Sample: + - Not over SSL/TLS + - '0' + - Over SSL/TLS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mitreMapping + ProductCode: + - pdi + - xns + Description_EN: The MITRE tags + Sample: + - T1090 (TA0011) + - T1071 (TA0011) + - T1071.001 (TA0011) + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ja3Hash + ProductCode: + - pdi + - xns + Description_EN: The fingerprint of an SSL/TLS client application as detected + via a network sensor or device + Sample: + - 72a589da586844d7f0818ce684948eea + - cd08e31494f9531f560d64c695473da9 + - 6dca00d8741247e245e4f2a632f1e62b + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ja3sHash + ProductCode: + - pdi + - xns + Description_EN: The fingerprint of an SSL/TLS server application as detected + via a network sensor or device + Sample: + - e54965894d6b45ecb4323c7ea3d6c115 + - ec74a5c51106f0419184d0dd08fb05bc + - ba1b42efc7dc57bb43bf81de59791c1b + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mitreVersion + ProductCode: + - pdi + - xns + - sds + - pds + Description_EN: The MITRE version + Sample: + - v9 + - v6 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: reportGUID + ProductCode: + - sca + - sfs + - pdi + - xns + Description_EN: The GUID for Workbench to request report page data + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: denyListFileHashSha256 + ProductCode: + - pdi + - xns + Description_EN: The SHA-256 of User-Defined Suspicious Object + Sample: + - 757E5C8823CAA7406030A7E26AED2A2C95D16F69C5A14C884C8CAA72A0C001C3 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pcapUUID + ProductCode: + - pdi + - xns + Description_EN: The PCAP file UUID + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: peerEndpointGUID + ProductCode: + - pdi + - xns + - stp + - ptp + Description_EN: The endpoint GUID of the agent peer host + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: rawSrcIp + ProductCode: + - pdi + - xns + Description_EN: The source IP without replacement + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: rawDstIp + ProductCode: + - pdi + - xns + Description_EN: The destination IP without replacement + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: rawSrcPort + ProductCode: + - pdi + - xns + Description_EN: The source port number without replacement + Sample: + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: rawDstPort + ProductCode: + - pdi + - xns + Description_EN: The destination port number without replacement + Sample: + - 33186 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertIssuerCommonName + ProductCode: + - pdi + - xns + Description_EN: The issuer common name + Sample: + - Microsoft Azure TLS Issuing CA 05 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertCommonName + ProductCode: + - pdi + - xns + Description_EN: The subject common name + Sample: + - settings-win.data.microsoft.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertIssuerOrgName + ProductCode: + - pdi + - xns + Description_EN: The issuer organization name + Sample: + - Microsoft Corporation + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertOrgName + ProductCode: + - pdi + - xns + Description_EN: The subject organization name + Sample: + - Microsoft + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: aptCampaigns + ProductCode: + - pdi + - xns + Description_EN: The related APT campaigns + Sample: + - POSSIBLE LSTUDIO + - WEB LURKER + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: threatNames + ProductCode: + - pdi + - xns + Description_EN: The associated threats + Sample: + - HM_GERAL.MIP00000001 + - HM_JADTRE.MIP00000001 + - VAN_BOT.UMXX + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: rawDataStr + ProductCode: + - pdi + - xns + - scs + - xns + Description_EN: The JSON string that contains additional information + Sample: + - '{"TLS version": "0x0303", "Cipher Suite": "0xc030"}' + - '{"Scanned ports": "23, 80, 443"}' + - '{"HTTP Content-Type": "application/hal+json", "HTTP Content-Body": "{\\"_links\\": + {\\"type\\": {\\"href\\": \\"http://10.10.10.10/rest/type/node/INVALID_VALUE\\"}}, + \\"type\\": {\\"target_id\\": \\"article\\"}, \\"title\\": {\\"value\\": \\"My + Article\\"}, \\"body\\": {\\"value\\": \\"\\"}}"}' + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: eventTime + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The time the agent or product detected the event + Sample: + - 1657135700000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: request + ProductCode: + - sig + - szn + - pdi + - xns + Description_EN: The destination URL that the user is accessing + Sample: + - https://google.com/ + - https://api/example/v1/testit + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The name of the log event + Sample: + - SWG_ACTIVITY_LOG + - FIREWALL_ACTIVITY_LOG + - VPC_ACTIVITY_LOG + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: clientIp + ProductCode: + - sig + - szn + - pdi + - xns + Description_EN: The endpoint IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: userDomain + ProductCode: + - sig + - pdi + - xns + Description_EN: Active directory domain, domain of username for logging in + TMAS adminportal adminportal + Sample: + - trendmicro.com + DL_Type: string + DL_CommonKey: + - DomainName + - AccountDomain + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sig + - pdi + - xns + Description_EN: The user name or IP address (IPv4) + Sample: + - Sample User Name + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: fileHash + ProductCode: + - sig + - pdi + - xns + Description_EN: The SHA-1 of the file that violated the policy + Sample: + - 1e15bf99022a9164708cebb3eace8fd61ad45cba + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: fileHashSha256 + ProductCode: + - sig + - pdi + - xns + Description_EN: The SHA-256 of the file that violated the policy + Sample: + - ba9edecdd09de1307714564c24409bd25508e22fe11c768053a08f173f263e93 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: fileName + ProductCode: + - sig + - pdi + - xns + Description_EN: The name of the file that violated the policy + Sample: + - word.doc + DL_Type: string + DL_CommonKey: + - FileName + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: fileSize + ProductCode: + - sig + - pdi + - xns + Description_EN: The size of the file that is violating the policy + Sample: + - 12134 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - sig + - pdi + - xns + Description_EN: The type of file which is violating the policy + Sample: + - Microsoft Words + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mimeType + ProductCode: + - sig + - pdi + - xns + Description_EN: The MIME type or content type of the response body + Sample: + - text/html + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestMethod + ProductCode: + - sig + - pdi + - xns + Description_EN: The network protocol request method + Sample: + - POST + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sig + - pdi + - xns + - vpc + - azv + Description_EN: The product name + Sample: + - Secure Web Gateway + - XDR for Cloud - AWS VPC Flow Logs + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - sig + - pdi + - xns + Description_EN: The non-endpoint object such as a network appliance + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: requestMimeType + ProductCode: + - sig + - pdi + - xns + Description_EN: The type of request content + Sample: + - application/json; charset=utf-8 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: tlsJA3Fingerprint + ProductCode: + - sig + - pdi + - xns + Description_EN: The JA3 fingerprint + Sample: + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionStart + ProductCode: + - szn + - pdi + - xns + Description_EN: The session start time (in seconds) + Sample: + - 1575462989 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionEnd + ProductCode: + - szn + - pdi + - xns + Description_EN: The session end time, in seconds + Sample: + - 1575462989 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serverIp + ProductCode: + - pdi + - xns + Description_EN: The server IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: clientPort + ProductCode: + - pdi + - xns + Description_EN: The client port number + Sample: + - 5566 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: serverPort + ProductCode: + - pdi + - xns + Description_EN: The server port number + Sample: + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: clientMAC + ProductCode: + - pdi + - xns + Description_EN: The client MAC address + Sample: + - 00-00-00-ff-ff-ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serverMAC + ProductCode: + - pdi + - xns + Description_EN: The server MAC address + Sample: + - 00-00-00-ff-ff-ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: flowId + ProductCode: + - pdi + - xns + Description_EN: The network analysis flow ID + Sample: + - '6837014561409730558' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: status + ProductCode: + - pdi + - xns + Description_EN: The network analysis flow session status + Sample: + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: app + ProductCode: + - pdi + - xns + Description_EN: The network protocol + Sample: + - HTTP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: httpReferer + ProductCode: + - pdi + - xns + Description_EN: The HTTP referrer header + Sample: + - www.google.com.tw + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: httpXForwardedFor + ProductCode: + - pdi + - xns + Description_EN: The HTTP X-Forwarded-For header + Sample: + - 10.10.10.10, 10.10.10.11, 10.10.10.12 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestClientApplication + ProductCode: + - pdi + - xns + Description_EN: The HTTP user agent + Sample: + - Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) + Chrome/61.0.3163.100 Safari/537.36 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestDate + ProductCode: + - pdi + - xns + Description_EN: The HTTP date header + Sample: + - Fri, 20 Oct 2017 06:02:09 GMT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestHeaders + ProductCode: + - pdi + - xns + Description_EN: All HTTP headers without sensitive information + Sample: + - "Host: 10.10.10.10:8080\r\nUser-Agent: curl/7.78.0\r\nAccept: */*\r\n" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: overSsl + ProductCode: + - pdi + - xns + Description_EN: SSL protocol connection + Sample: + - YES + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: respCode + ProductCode: + - pdi + - xns + Description_EN: The network protocol response code + Sample: + - '200' + - '25' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: respDate + ProductCode: + - pdi + - xns + Description_EN: The HTTP response date header + Sample: + - Fri, 20 Oct 2017 06:02:09 GMT + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: httpLocation + ProductCode: + - pdi + - xns + Description_EN: The HTTP location header + Sample: + - www.google.com.tw + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: respHeaders + ProductCode: + - pdi + - xns + Description_EN: All HTTP response headers without sensitive information + Sample: + - "Accept-Ranges: bytes\r\nContent-Length: 68\r\nContent-Type: - text/plain; charset=utf-8\r\ + \ \nLast-Modified: Thu, 19 Aug 2021 06:23:54 GMT\r\nDate: Thu, 19 Aug 2021 06:24:00 + GMT\r\n" + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: respFileHash + ProductCode: + - pdi + - xns + Description_EN: The SHA-1 of the file detected in the response direction + Sample: + - f17d9c55dea88f9aec8f74363f01e918cffb4142 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: respFileHashSha256 + ProductCode: + - pdi + - xns + Description_EN: The SHA-256 of the file detected in the response direction + Sample: + - 5ad4396d67f0c9d54572f051e28e9e62f4010c269a953d25259b17ad5fab4fd5 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: respFileType + ProductCode: + - pdi + - xns + Description_EN: The file type detected in the response direction + Sample: + - PKZIP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: respArchFiles + ProductCode: + - pdi + - xns + Description_EN: The file information extracted from files detected in response + direction + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: httpXForwardedForIp + ProductCode: + - pdi + - xns + Description_EN: The x-forwarded-for IP used by the network appliance + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: httpXForwardedForPort + ProductCode: + - pdi + - xns + Description_EN: The patched HTTP server port when the network appliance + selects an x-forwarded-for IP address to use + Sample: + - 65535 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: resolvedUrlIp + ProductCode: + - pdi + - xns + Description_EN: The IP address of the FQDN + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: resolvedUrlPort + ProductCode: + - pdi + - xns + Description_EN: The HTTP server port + Sample: + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: false +- Name: respMethod + ProductCode: + - pdi + - xns + Description_EN: The response method + Sample: + - KRB_ERROR + - AS_REP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: msgId + ProductCode: + - pdi + - xns + Description_EN: The service provider message ID + Sample: + - + DL_Type: string + DL_CommonKey: + - EmailMessageID + DL_Searchable: true + DL_Aggregable: false +- Name: mailMsgSubject + ProductCode: + - pdi + - xns + Description_EN: The email subject + Sample: + - test + DL_Type: string + DL_CommonKey: + - EmailSubject + DL_Searchable: true + DL_Aggregable: false +- Name: suser + ProductCode: + - pdi + - xns + Description_EN: The email sender + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - EmailSender + DL_Searchable: true + DL_Aggregable: false +- Name: duser + ProductCode: + - pdi + - xns + Description_EN: The email recipient + Sample: + - sample_email@trendmicro.com + DL_Type: dynamic + DL_CommonKey: + - EmailRecipient + DL_Searchable: true + DL_Aggregable: false +- Name: requests + ProductCode: + - pdi + - xns + Description_EN: The URLs of the request + Sample: + - www.google.com.tw + DL_Type: dynamic + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: direction + ProductCode: + - pdi + - xns + Description_EN: The object transfer direction + Sample: + - Download + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: archFiles + ProductCode: + - pdi + - xns + Description_EN: The file information extracted from detected files + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: hostName + ProductCode: + - pdi + - xns + Description_EN: The host name + Sample: + - NJ-EFFY-ZHAO1 + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: tlsSelectedCipher + ProductCode: + - pdi + - xns + Description_EN: The selected cipher of the TLS protocol + Sample: + - c02f + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertCommonName + ProductCode: + - pdi + - xns + Description_EN: The certificate common name + Sample: + - '*.www.sample.com' + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: sslCertIssuer + ProductCode: + - pdi + - xns + Description_EN: The issuer of the certificate + Sample: + - /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance + Server CA + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertValidFrom + ProductCode: + - pdi + - xns + Description_EN: The certificate validity start time + Sample: + - '2014-11-21T02:43:28' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertValidUntil + ProductCode: + - pdi + - xns + Description_EN: The certificate validity end time + Sample: + - '2018-11-21T02:43:28' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertSerialNumber + ProductCode: + - pdi + - xns + Description_EN: The certificate serial number + Sample: + - 0888b1ad2a593310593f47565a5a5a4a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertSANs + ProductCode: + - pdi + - xns + Description_EN: The Subject Alternative Name of the certificate + Sample: + - '*.www.sample.com' + - add.my.sample.com + - au.sample.com + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sslCertFingerprint + ProductCode: + - pdi + - xns + Description_EN: The certificate fingerprint + Sample: + - 3914af80223c833f26df001cbf342eff8a31aba1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ja3Hash + ProductCode: + - pdi + - xns + Description_EN: The JA3 hash + Sample: + - 478e74fad764c966f19c5232c7cdfc5a + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ja3sHash + ProductCode: + - pdi + - xns + Description_EN: The JA3S hash + Sample: + - 6d37fb1b3306d6e9f875650d8eb74b4f + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: tlsJA3SFingerprint + ProductCode: + - pdi + - xns + Description_EN: The raw JA3S + Sample: + - 771,157,65281-15 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ftpTrans + ProductCode: + - pdi + - xns + Description_EN: The transaction information of the FTP protocol + Sample: + - + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dnsQueryType + ProductCode: + - pdi + - xns + Description_EN: The record type requested by the DNS protocol + Sample: + - A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectIps + ProductCode: + - pdi + - xns + Description_EN: The IP address resolved by the DNS protocol + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: reqAppVersion + ProductCode: + - xns + - pdi + Description_EN: The client application version number + Sample: + - SSH-2.0-OPENSSH_9.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: respAppVersion + ProductCode: + - xns + - pdi + Description_EN: The server application version number + Sample: + - SSH-2.0-OPENSSH_8.7 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: reqScannedBytes + ProductCode: + - pdi + - xns + Description_EN: The data volume transmitted by the client (in bytes) + Sample: + - 4655 + DL_Type: string + DL_Searchable: true +- Name: respScannedBytes + ProductCode: + - pdi + - xns + Description_EN: The data volume transmitted by the server (in bytes) + Sample: + - 6654 + DL_Type: string + DL_Searchable: true +- Name: reqDataSize + ProductCode: + - xns + - pdi + Description_EN: The data volume transmitted over the transport layer by the + client (in bytes) + Sample: + - 15688 + DL_Type: string + DL_Searchable: true +- Name: respDataSize + ProductCode: + - xns + - pdi + Description_EN: The data volume transmitted over the transport layer by the + server (in bytes) + Sample: + - 7856 + DL_Type: string + DL_Searchable: true +- Name: clientGroup + ProductCode: + - xns + - pdi + Description_EN: The client IP network group + Sample: + - myCompany + - myGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: serverGroup + ProductCode: + - xns + - pdi + Description_EN: The server IP network group + Sample: + - myCompany + - myGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: httpXForwardedForGroup + ProductCode: + - xns + - pdi + Description_EN: The X-Forwarded-For IP network group + Sample: + - myCompany + - myGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: resolvedUrlGroup + ProductCode: + - xns + - pdi + Description_EN: The IP address FQDN network group + Sample: + - myCompany + - myGroup + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: rawDataStr + ProductCode: + - pdi + - xns + Description_EN: The raw data string that contains additional information + Sample: + - '[{ "oid": "1.2.3.4", "value_type": 4, "value": "MANUFACTURER:SAMPLE\ nMODEL:SAMPLE + C1234", "parse": 1}]' + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: dvc + ProductCode: + - pdi + - xns + Description_EN: The IP address of the Deep Discovery Inspector or Virtual + Network Sensor appliance + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dvchost + ProductCode: + - pdi + - xns + Description_EN: The network device hostname + Sample: + - my-company-xns + - my-ddi + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - xns + - pdi + - vpc + - azv + Description_EN: The event ID + Sample: + - '200139' + - '200140' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: sessionEndReason + ProductCode: + - xns + - pdi + Description_EN: The reason why a session was terminated + Sample: + - tcp-fin + - tcp-rst-from-server + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Network/Trend Micro Web Security.yaml b/doc_v2/Network/Trend Micro Web Security.yaml new file mode 100644 index 0000000..5d6aab4 --- /dev/null +++ b/doc_v2/Network/Trend Micro Web Security.yaml @@ -0,0 +1,334 @@ +- Name: userDomain + ProductCode: + - sao + - sws + - sig + Description_EN: The user domain + Sample: + - example.com.pa + - DOMAIN + DL_Type: string + DL_CommonKey: + - EndpointName + - DomainName + - AccountDomain + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestBase + ProductCode: + - sws + - sig + - szn + Description_EN: The domain of the request URL + Sample: + - weather.service.msn.com + - test.domain.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - pdi + - xns + - sws + - sao + - sig + - sca + - ams + - sds + Description_EN: The requested URL category + Sample: + - Untested + - '158' + - Web Advertisement + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userDepartment + ProductCode: + - sws + - sig + Description_EN: User department + Sample: + - Operations + - BANCA CONSTRUCCION + - CONTACT CENTER + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sender + ProductCode: + - sws + - sig + Description_EN: The roaming users or the gateway where the web traffic passed + Sample: + - test user + - VE C&W - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyName + ProductCode: + - sao + - sca + - sws + - sem + - sig + - ptn + - scs + - mns + Description_EN: The name of the triggered policy + Sample: + - Steelcase + - Cabot + - Tigre - Medium Policy + - apiPostedPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: principalName + ProductCode: + - sws + - sig + - sca + - szn + Description_EN: The user principal name used to sign in to the proxy + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: profile + ProductCode: + - sws + - sig + Description_EN: The name of the triggered Threat Protection template or Data + Loss Prevention profile + Sample: + - Primary Protection Rule + - Multibak Scaner Threat + - default + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: application + ProductCode: + - sws + - sig + - szn + - sao + Description_EN: The name of the requested application + Sample: + - HyperText Transfer Protocol + - DoubleClick + - The Secure HyperText Transfer Protocol + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Network/Zero Trust Secure Access - Internet Access.yaml b/doc_v2/Network/Zero Trust Secure Access - Internet Access.yaml new file mode 100644 index 0000000..4f8c099 --- /dev/null +++ b/doc_v2/Network/Zero Trust Secure Access - Internet Access.yaml @@ -0,0 +1,1474 @@ +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: userDomain + ProductCode: + - sao + - sws + - sig + Description_EN: The user domain + Sample: + - example.com.pa + - DOMAIN + DL_Type: string + DL_CommonKey: + - EndpointName + - DomainName + - AccountDomain + DL_Searchable: true + DL_Aggregable: false +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: fileHash + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - sig + - sfs + - sfc + - sss + - ddr + Description_EN: The SHA-1 of the file that triggered the rule or policy + Sample: + - DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 + - 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F + - 3AD1F4E7CAA11E5199EE80B8983677ADDD065450 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: fileHashSha256 + ProductCode: + - pdi + - xns + - sao + - sig + - sds + - sfs + - sfc + - sss + - scs + Description_EN: The SHA-256 of the file (fileName) + Sample: + - 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB + - BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294 + - 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sds + - sca + - sao + - pdi + - xns + - sws + - pds + - stp + - sig + Description_EN: User name or mailbox + Sample: + - root + - US EXAMPLE\TEST + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubName + ProductCode: + - sao + - sca + - sds + - sem + - xes + - sig + - sss + Description_EN: The event type sub-name + Sample: + - IPS Detection + - Personal Firewall + - Attack Discovery + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - pdi + - xns + - sao + - ptp + - xes + - stp + - sig + Description_EN: The GUID of the agent which reported the detection + Sample: + - 00000000-0000-0000-0000-000000000000 + - 11111111-1111-1111-1111-111111111111 + - 22222222-2222-2222-2222-222222222222 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: requestBase + ProductCode: + - sws + - sig + - szn + Description_EN: The domain of the request URL + Sample: + - weather.service.msn.com + - test.domain.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - pdi + - xns + - sws + - sao + - sig + - sca + - ams + - sds + Description_EN: The requested URL category + Sample: + - Untested + - '158' + - Web Advertisement + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userDepartment + ProductCode: + - sws + - sig + Description_EN: User department + Sample: + - Operations + - BANCA CONSTRUCCION + - CONTACT CENTER + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sender + ProductCode: + - sws + - sig + Description_EN: The roaming users or the gateway where the web traffic passed + Sample: + - test user + - VE C&W - 10.10.10.10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyName + ProductCode: + - sao + - sca + - sws + - sem + - sig + - ptn + - scs + - mns + Description_EN: The name of the triggered policy + Sample: + - Steelcase + - Cabot + - Tigre - Medium Policy + - apiPostedPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: principalName + ProductCode: + - sws + - sig + - sca + - szn + Description_EN: The user principal name used to sign in to the proxy + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: profile + ProductCode: + - sws + - sig + Description_EN: The name of the triggered Threat Protection template or Data + Loss Prevention profile + Sample: + - Primary Protection Rule + - Multibak Scaner Threat + - default + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: application + ProductCode: + - sws + - sig + - szn + - sao + Description_EN: The name of the requested application + Sample: + - HyperText Transfer Protocol + - DoubleClick + - The Secure HyperText Transfer Protocol + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileSize + ProductCode: + - pdi + - xns + - sig + - sao + - sfs + - sfc + - sss + Description_EN: The file size of the suspicious file + Sample: + - '0' + - '1255856' + - '1237880' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - pdi + - xns + - sig + - sfs + - sfc + - sss + - scs + Description_EN: The file type of the suspicious file + Sample: + - EXE + - LNK + - MIME + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osName + ProductCode: + - sig + - ams + - szn + - ddr + - sss + Description_EN: The host OS name + Sample: + - Linux + - windows 10.0.22000 + - windows 10.0.19044 + - windows 10.0.19043 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: policyTemplate + ProductCode: + - sao + - sca + - sig + Description_EN: The one-to-many data structure + Sample: + - policyName:Monitoreo All Files, template:Managed - All files + - policyName:HSS DLP, template:All File Extension + - 'India: Mobile Numbers' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyUuid + ProductCode: + - sig + - szn + Description_EN: The UUID of the cloud access or risk control policy, or the + hard-coded string that indicates the rule of the global blocked/approved URL + list + Sample: + - 7937cb0b-e598-4c8f-a50f-65c32905ba3a + - C!7c4433e3-5b2c-449f-b66e-ccaac006b6f1 + - 8d265639-7202-4455-b640-48683aa2b57d + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logKey + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + Description_EN: The unique key of the event + Sample: + - 123e4567-e89b-12d3-a456-426614174000 + - 987f6543-21ba-43cd-9e8f-123456789abc + - 456789ab-cdef-1234-5678-9abcdef01234 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mimeType + ProductCode: + - sig + Description_EN: The MIME type or content type of the response body + Sample: + - application/octet-stream + - application/json; charset=utf-8 + - application/json + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientIp + ProductCode: + - sig + - szn + Description_EN: The IP addresses of the source + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: authType + ProductCode: + - sig + Description_EN: The authorization type + Sample: + - Cookie JWT + - No Auth + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cloudAppCat + ProductCode: + - sig + Description_EN: The category of the event in Cloud Reputation Service + Sample: + - All + - Online Service + - Application Suite + - Business Intelligence and Analytics + - Cloud Computing Platform + DL_Type: string + DL_Searchable: true +- Name: srcLocation + ProductCode: + - sig + Description_EN: The source country + Sample: + - JP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstLocation + ProductCode: + - sig + Description_EN: The destination country + Sample: + - JP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: isPrivateApp + ProductCode: + - sig + Description_EN: Whether the requested application is private + Sample: + - true + - false + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventTime + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The time the agent or product detected the event + Sample: + - 1657135700000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointHostName + ProductCode: + - sig + - szn + Description_EN: The host name of the device on which the event was detected + Sample: + - my_machine + - jeremy-mbp + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: osName + ProductCode: + - sig + - szn + Description_EN: The host operating system name + Sample: + - Windows 10 + - macos 12.1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - sig + - szn + - vpc + - azv + Description_EN: The destination IP address (dstaddr) + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGuid + ProductCode: + - sig + - szn + Description_EN: The device GUID + Sample: + - 11111111-1111-1111-1111-111111111111 + - DSP84573ULLJHM5GK2R7 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: principalName + ProductCode: + - sig + - szn + Description_EN: The User Principal Name + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: request + ProductCode: + - sig + - szn + - pdi + - xns + Description_EN: The destination URL that the user is accessing + Sample: + - https://google.com/ + - https://api/example/v1/testit + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - sig + - szn + Description_EN: The action + Sample: + - Allow + - Block + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - sig + - szn + - vpc + - azv + Description_EN: The source IP address (srcaddr) + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: serverTls + ProductCode: + - sig + - szn + Description_EN: The TLS version between the Service Gateway and server/website + Sample: + - TLS 1.2 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serverProtocol + ProductCode: + - sig + - szn + Description_EN: The version of the HTTP protocol between the Service Gateway + and server/website + Sample: + - HTTP/1.1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userAgent + ProductCode: + - sig + - szn + Description_EN: The user agent or the agent through which the request was made + Sample: + - Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) + - Chrome/74.0.3729.108 Safari/537.36 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rt + ProductCode: + - sig + - szn + Description_EN: The UTC timestamp + Sample: + - 1599465660 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: eventName + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The name of the log event + Sample: + - SWG_ACTIVITY_LOG + - FIREWALL_ACTIVITY_LOG + - VPC_ACTIVITY_LOG + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: application + ProductCode: + - sig + - szn + Description_EN: The name of the requested application + Sample: + - Facebook + - wiki + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleName + ProductCode: + - sig + - szn + - azv + Description_EN: The name of the triggered cloud access rule + Sample: + - ETL_Access Rules_Web_Host + - block_wiki_for_guest + - BlockHighRiskTCPPortsFromInternet + - unspecified + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: clientIp + ProductCode: + - sig + - szn + - pdi + - xns + Description_EN: The endpoint IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: requestBase + ProductCode: + - sig + - szn + Description_EN: The URL domain + Sample: + - www.facebook.com + - gary.webserver64.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: score + ProductCode: + - sig + Description_EN: The WRS score + Sample: + - 81 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: userDomain + ProductCode: + - sig + - pdi + - xns + Description_EN: Active directory domain, domain of username for logging in + TMAS adminportal adminportal + Sample: + - trendmicro.com + DL_Type: string + DL_CommonKey: + - DomainName + - AccountDomain + DL_Searchable: true + DL_Aggregable: false +- Name: suid + ProductCode: + - sig + - pdi + - xns + Description_EN: The user name or IP address (IPv4) + Sample: + - Sample User Name + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: duration + ProductCode: + - sig + Description_EN: The time it took the scanner to complete the scan, in + milliseconds + Sample: + - 1599465660123 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventSubName + ProductCode: + - sig + Description_EN: The Zero Trust Secure Access - Internet Access cloud app + action or the Palo Alto Networks firewall log sub-type + Sample: + - OneDrive download file + - start + - end + - drop + - deny + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fileHash + ProductCode: + - sig + - pdi + - xns + Description_EN: The SHA-1 of the file that violated the policy + Sample: + - 1e15bf99022a9164708cebb3eace8fd61ad45cba + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: fileHashSha256 + ProductCode: + - sig + - pdi + - xns + Description_EN: The SHA-256 of the file that violated the policy + Sample: + - ba9edecdd09de1307714564c24409bd25508e22fe11c768053a08f173f263e93 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: fileName + ProductCode: + - sig + - pdi + - xns + Description_EN: The name of the file that violated the policy + Sample: + - word.doc + DL_Type: string + DL_CommonKey: + - FileName + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: fileSize + ProductCode: + - sig + - pdi + - xns + Description_EN: The size of the file that is violating the policy + Sample: + - 12134 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: fileType + ProductCode: + - sig + - pdi + - xns + Description_EN: The type of file which is violating the policy + Sample: + - Microsoft Words + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sig + Description_EN: The name of the detected malware + Sample: + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: mimeType + ProductCode: + - sig + - pdi + - xns + Description_EN: The MIME type or content type of the response body + Sample: + - text/html + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sender + ProductCode: + - sig + Description_EN: The Zero Trust Internet Access gateway location + Sample: + - Public/Home network: The default cloud gateway. + - Anything else: The pre-defined location name of cloud gateway or on-premises + gateway. + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - sig + - szn + Description_EN: The traffic detection type + Sample: + - No matched Zero Trust Secure Access rule + - Missing or invalid client certificate + - Untrusted server certificate + - Zero Trust Secure Access + - HTTPS inspection exception + - HTTPS inspection failure + - HTTPS bypass at inspection failure + - Approved URLs + - Blocked URLs + - Private IP address access + - Web Reputation + - URL Filtering + - Restricted file type + - Restricted MIME type + - Restricted file extension type + - Anti-malware scan + - File scan exception + - Predictive Machine Learning + - Botnet + - Application Control + - Virtual Analyzer submission + - Tenancy Restriction + - Suspicious Object Blocked List + - Data Loss Prevention + - Ransomware + - Risk Control + - AI Service Risk Control + - Non-compliant device + - AI Service Access + - AI Service Sensitive Data Prevention + - AI Service Prompt Injection + - AI Service Improper Answer + - AI Service Malicious URL Answer + - AI Service File Upload Detection + - AI Service Rate Limiting + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: profile + ProductCode: + - sig + Description_EN: The name of the triggered Threat Protection template or Data + Loss Prevention profile triggered + Sample: + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userDepartment + ProductCode: + - sig + Description_EN: The user department request method + Sample: + - Sales + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestMethod + ProductCode: + - sig + - pdi + - xns + Description_EN: The network protocol request method + Sample: + - POST + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: pname + ProductCode: + - sig + - pdi + - xns + - vpc + - azv + Description_EN: The product name + Sample: + - Secure Web Gateway + - XDR for Cloud - AWS VPC Flow Logs + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sig + Description_EN: The product version + Sample: + - 1.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: deviceGUID + ProductCode: + - sig + - pdi + - xns + Description_EN: The non-endpoint object such as a network appliance + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: requestMimeType + ProductCode: + - sig + - pdi + - xns + Description_EN: The type of request content + Sample: + - application/json; charset=utf-8 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: failedHTTPSInspection + ProductCode: + - sig + Description_EN: HTTPS traffic inspection failure + Sample: + - true + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: tlsJA3Fingerprint + ProductCode: + - sig + - pdi + - xns + Description_EN: The JA3 fingerprint + Sample: + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: responseSize + ProductCode: + - sig + Description_EN: The response length + Sample: + - 1324 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientProtocol + ProductCode: + - sig + Description_EN: The client protocol + Sample: + - HTTP/1.1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientTls + ProductCode: + - sig + Description_EN: The transport layer security of the client + Sample: + - TLS 1.2 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: contentEncoding + ProductCode: + - sig + Description_EN: The content encoding of the request or the response + Sample: + - gzip + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: authType + ProductCode: + - sig + Description_EN: The authentication method + Sample: + - Cookie JWT: Authenticated by browser cookie with JWT token + - Agent JWT: Authenticated by Secure Access Module with JWT token + - IP: Authentication bypassed by private IP. + - No Auth: No authentication. + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestSize + ProductCode: + - sig + Description_EN: The request length + Sample: + - 1324 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serverRespTime + ProductCode: + - sig + Description_EN: The time the server took to respond to the request, in + milliseconds + Sample: + - 1599465660123 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: trafficType + ProductCode: + - sig + Description_EN: The Zero Trust Internet Access gateway service mode + Sample: + - Proxy: Zero Trust Internet Access On-Premises Gateway with forward proxy + mode configured + - Forward: Zero Trust Internet Access On-Premises Gateway with forward proxy + mode and port forwarding configured + - ICAP: Zero Trust Internet Access On-Premises Gateway with ICAP configured + - Reverse: Zero Trust Internet Access On-Premises Gateway with reverse proxy + mode configured + - Proxy (xx): Cloud Gateway in xx PoP with forward proxy mode + - Forward (xx): Cloud Gateway in xx PoP with forward proxy mode for port + forwarding + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - sig + Description_EN: The URL category + Sample: + - Social Networking + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: policyTemplate + ProductCode: + - sig + Description_EN: The Data Loss Prevention template name + Sample: + - 'Australia, New Zealand: Healthcare Template,Germany: Banking and Financial Information' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: e2eLatency + ProductCode: + - sig + Description_EN: The end-to-end traffic latency time, in milliseconds + Sample: + - 10000 + DL_Type: string + DL_Searchable: true +- Name: cloudAppCat + ProductCode: + - sig + Description_EN: The category of the event in Cloud Reputation Service + Sample: + - All + - Online Service + - Application Suite + - Business Intelligence and Analytics + - Cloud Computing Platform + DL_Type: string + DL_Searchable: true +- Name: srcLocation + ProductCode: + - sig + Description_EN: The source country + Sample: + - JP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dstLocation + ProductCode: + - sig + Description_EN: The destination country + Sample: + - JP + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: isPrivateApp + ProductCode: + - sig + Description_EN: Whether the requested application is private + Sample: + - true + - false + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true diff --git a/doc_v2/Network/Zero Trust Secure Access - Private Access.yaml b/doc_v2/Network/Zero Trust Secure Access - Private Access.yaml new file mode 100644 index 0000000..a68cded --- /dev/null +++ b/doc_v2/Network/Zero Trust Secure Access - Private Access.yaml @@ -0,0 +1,880 @@ +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: ruleName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - ptp + - xes + - sem + - stp + - szn + - scs + - xms + - mns + - ddr + Description_EN: The name of the rule that triggered the event + Sample: + - Directory Server - Microsoft Windows Active Directory + - Microsoft Windows Events + - Microsoft Windows Security Events - 3 + - (T1234) New executable created (chmod) + - Sensitive Files Upload to Personal Cloud + - Multiple Sensitive Files Compression + - Transfer Sensitive Files to Removable Storage + - Move Multiple Sensitive Files to Central Location + - Multiple Sensitive Files Modification + - Multiple Sensitive Files Deletion + - GEN_CCFR_OVERLAY_TEST.A + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: requestBase + ProductCode: + - sws + - sig + - szn + Description_EN: The domain of the request URL + Sample: + - weather.service.msn.com + - test.domain.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: false +- Name: principalName + ProductCode: + - sws + - sig + - sca + - szn + Description_EN: The user principal name used to sign in to the proxy + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: application + ProductCode: + - sws + - sig + - szn + - sao + Description_EN: The name of the requested application + Sample: + - HyperText Transfer Protocol + - DoubleClick + - The Secure HyperText Transfer Protocol + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectId + ProductCode: + - sao + - szn + Description_EN: The UUID of the object + Sample: + - '3' + - '2' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osName + ProductCode: + - sig + - ams + - szn + - ddr + - sss + Description_EN: The host OS name + Sample: + - Linux + - windows 10.0.22000 + - windows 10.0.19044 + - windows 10.0.19043 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: rt + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - szn + - xms + Description_EN: The Unix time of the log generation + Sample: + - 1656324260000 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: ruleType + ProductCode: + - sds + - sao + - sca + - szn + Description_EN: The access rule type + Sample: + - udso + - point of entry + - unknown + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: policyUuid + ProductCode: + - sig + - szn + Description_EN: The UUID of the cloud access or risk control policy, or the + hard-coded string that indicates the rule of the global blocked/approved URL + list + Sample: + - 7937cb0b-e598-4c8f-a50f-65c32905ba3a + - C!7c4433e3-5b2c-449f-b66e-ccaac006b6f1 + - 8d265639-7202-4455-b640-48683aa2b57d + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleUuid + ProductCode: + - ptp + - stp + - sca + - szn + Description_EN: The signature UUID from the DV (Digital Vaccine) + Sample: + - 00000001-0001-0001-0001-000000007610 + - 00000001-0001-0001-0001-000000007120 + - 00000001-0001-0001-0001-000000017056 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: clientIp + ProductCode: + - sig + - szn + Description_EN: The IP addresses of the source + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osVer + ProductCode: + - ams + - szn + - ddr + Description_EN: The OS version + Sample: + - '11' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionStart + ProductCode: + - szn + Description_EN: The session start time, in seconds + Sample: + - 1575462989 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionEnd + ProductCode: + - szn + Description_EN: The session end time, in seconds + Sample: + - 1575462989 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventTime + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The time the agent or product detected the event + Sample: + - 1657135700000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointHostName + ProductCode: + - sig + - szn + Description_EN: The host name of the device on which the event was detected + Sample: + - my_machine + - jeremy-mbp + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: osName + ProductCode: + - sig + - szn + Description_EN: The host operating system name + Sample: + - Windows 10 + - macos 12.1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - sig + - szn + - vpc + - azv + Description_EN: The destination IP address (dstaddr) + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGuid + ProductCode: + - sig + - szn + Description_EN: The device GUID + Sample: + - 11111111-1111-1111-1111-111111111111 + - DSP84573ULLJHM5GK2R7 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: principalName + ProductCode: + - sig + - szn + Description_EN: The User Principal Name + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: false +- Name: request + ProductCode: + - sig + - szn + - pdi + - xns + Description_EN: The destination URL that the user is accessing + Sample: + - https://google.com/ + - https://api/example/v1/testit + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - sig + - szn + Description_EN: The action + Sample: + - Allow + - Block + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - sig + - szn + - vpc + - azv + Description_EN: The source IP address (srcaddr) + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: serverTls + ProductCode: + - sig + - szn + Description_EN: The TLS version between the Service Gateway and server/website + Sample: + - TLS 1.2 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serverProtocol + ProductCode: + - sig + - szn + Description_EN: The version of the HTTP protocol between the Service Gateway + and server/website + Sample: + - HTTP/1.1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: userAgent + ProductCode: + - sig + - szn + Description_EN: The user agent or the agent through which the request was made + Sample: + - Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) + - Chrome/74.0.3729.108 Safari/537.36 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: rt + ProductCode: + - sig + - szn + Description_EN: The UTC timestamp + Sample: + - 1599465660 + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: eventName + ProductCode: + - sig + - szn + - pdi + - xns + - vpc + - azv + Description_EN: The name of the log event + Sample: + - SWG_ACTIVITY_LOG + - FIREWALL_ACTIVITY_LOG + - VPC_ACTIVITY_LOG + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: application + ProductCode: + - sig + - szn + Description_EN: The name of the requested application + Sample: + - Facebook + - wiki + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: ruleName + ProductCode: + - sig + - szn + - azv + Description_EN: The name of the triggered cloud access rule + Sample: + - ETL_Access Rules_Web_Host + - block_wiki_for_guest + - BlockHighRiskTCPPortsFromInternet + - unspecified + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: clientIp + ProductCode: + - sig + - szn + - pdi + - xns + Description_EN: The endpoint IP address + Sample: + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: requestBase + ProductCode: + - sig + - szn + Description_EN: The URL domain + Sample: + - www.facebook.com + - gary.webserver64.com + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: detectionType + ProductCode: + - sig + - szn + Description_EN: The traffic detection type + Sample: + - No matched Zero Trust Secure Access rule + - Missing or invalid client certificate + - Untrusted server certificate + - Zero Trust Secure Access + - HTTPS inspection exception + - HTTPS inspection failure + - HTTPS bypass at inspection failure + - Approved URLs + - Blocked URLs + - Private IP address access + - Web Reputation + - URL Filtering + - Restricted file type + - Restricted MIME type + - Restricted file extension type + - Anti-malware scan + - File scan exception + - Predictive Machine Learning + - Botnet + - Application Control + - Virtual Analyzer submission + - Tenancy Restriction + - Suspicious Object Blocked List + - Data Loss Prevention + - Ransomware + - Risk Control + - AI Service Risk Control + - Non-compliant device + - AI Service Access + - AI Service Sensitive Data Prevention + - AI Service Prompt Injection + - AI Service Improper Answer + - AI Service Malicious URL Answer + - AI Service File Upload Detection + - AI Service Rate Limiting + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: ruleType + ProductCode: + - szn + Description_EN: The rule type which is applied to the traffic + Sample: + - access + DL_Type: string + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: ruleUuid + ProductCode: + - szn + Description_EN: The risk assessment and control design that is defined by Zero + Trust Secure Access risk control rules + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectId + ProductCode: + - szn + Description_EN: The UUID of the Zero Trust Secure Access private access + application + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: spt + ProductCode: + - szn + - vpc + - azv + Description_EN: The virtual port of the source assigned to the Secure Access + Module (srcport) + Sample: + - 57763 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: policyUuid + ProductCode: + - szn + Description_EN: The policy UUID + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dpt + ProductCode: + - szn + - vpc + - azv + Description_EN: The service destination port of the private application server + (dstport) + Sample: + - 443 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: companyName + ProductCode: + - szn + Description_EN: The company name + Sample: + - Trend Micro + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionStart + ProductCode: + - szn + - pdi + - xns + Description_EN: The session start time (in seconds) + Sample: + - 1575462989 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sessionEnd + ProductCode: + - szn + - pdi + - xns + Description_EN: The session end time, in seconds + Sample: + - 1575462989 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Others/Mobile Security.yaml b/doc_v2/Others/Mobile Security.yaml new file mode 100644 index 0000000..ad1a948 --- /dev/null +++ b/doc_v2/Others/Mobile Security.yaml @@ -0,0 +1,1123 @@ +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: request + ProductCode: + - pdi + - xns + - sao + - ptp + - sds + - sig + - sca + - stp + - sem + - pds + - ams + - szn + Description_EN: The notable URLs + Sample: + - http://example.page.com/canonical.html + - http://10.10.10.10 + - https://drive.google.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: actResult + ProductCode: + - sao + - sca + - sds + - pds + - pts + - ams + Description_EN: The result of an action + Sample: + - Dropped + - Successful + - Accepted + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - sem + - ptp + - xes + - sws + - stp + - sig + - ams + - scs + - xms + Description_EN: The internal product ID + Sample: + - Trend Micro Deep Security + - Deep Discovery Inspector + - Apex One + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: urlCat + ProductCode: + - pdi + - xns + - sws + - sao + - sig + - sca + - ams + - sds + Description_EN: The requested URL category + Sample: + - Untested + - '158' + - Web Advertisement + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: majorVirusType + ProductCode: + - pds + - sds + - ams + - ptn + - pts + - sfc + Description_EN: The virus type + Sample: + - Virus + - Suspicious Activity + - Trojan + - TROJ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionName + ProductCode: + - sao + - ams + Description_EN: The general name for the detection + Sample: + - Troj.Win32.TRX.XXPE50F13017 + - Troj.Win32.TRX.XXPE50FFF059 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: detectionType + ProductCode: + - pdi + - xns + - sds + - sws + - sao + - sca + - pds + - sem + - sig + - ams + - szn + - scs + Description_EN: The detection type + Sample: + - '1' + - File + - Process + - net + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: osName + ProductCode: + - sig + - ams + - szn + - ddr + - sss + Description_EN: The host OS name + Sample: + - Linux + - windows 10.0.22000 + - windows 10.0.19044 + - windows 10.0.19043 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - sig + - ams + - scs + - sfs + - sfc + - sss + Description_EN: The product version + Sample: + - 20.0.0.4726 + - 20.0.0.4416 + - 6.2.1125 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: score + ProductCode: + - pdi + - xns + - sao + - sca + - ams + - sds + Description_EN: The Web Reputation Services URL rating + Sample: + - 71 + - 81 + - 0 + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: mailbox + ProductCode: + - sca + - sem + - ams + - xms + Description_EN: The mailbox that is protected by Trend Micro + Sample: + - sample_email@trendmicro.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointModel + ProductCode: + - ams + Description_EN: Mobile device model + Sample: + - M2101K9G + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appPkgName + ProductCode: + - ams + Description_EN: The app package name + Sample: + - com.example.app_pkg_name_file + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appLabel + ProductCode: + - ams + Description_EN: App name + Sample: + - Mobile Security Virus Test Application + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appVerCode + ProductCode: + - ams + Description_EN: The app version code + Sample: + - 1 + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appPublicKeySha1 + ProductCode: + - ams + Description_EN: The app public key (SHA-1) + Sample: + - 72080A6B4EB11105B28E31C4753BC91414500AD4 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: false +- Name: appSize + ProductCode: + - ams + Description_EN: The app size (in bytes) + Sample: + - '28461' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appDexSha256 + ProductCode: + - ams + Description_EN: The app dex encoded using SHA-256 + Sample: + - 08736EDDD3682AC26D9FD42DA2A20B0BADB5C85A5456A0AE85B52D60C564F290 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: appIsSystem + ProductCode: + - ams + Description_EN: Whether the app is a system app + Sample: + - false + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osVer + ProductCode: + - ams + - szn + - ddr + Description_EN: The OS version + Sample: + - '11' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: minorVirusType + ProductCode: + - ams + Description_EN: Minor virus type + Sample: + - RANSOMWARE + - BANKER + - CREDENTIAL + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointGuid + ProductCode: + - ams + Description_EN: Host GUID of the endpoint on which the event was detected + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: endpointHostName + ProductCode: + - ams + Description_EN: The host name of the endpoint on which the event was detected + Sample: + - PHILIPSIBE09 + - WHAM6WK8XG2 + - MacBook-Pro-del-Meno + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointIp + ProductCode: + - ams + Description_EN: IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + - ::1 + - fe80::1 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: eventId + ProductCode: + - ams + Description_EN: Event type + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubId + ProductCode: + - ams + Description_EN: The access type + Sample: + - 2 - TELEMETRY_PROCESS_CREATE + - 101 - TELEMETRY_FILE_CREATE + - 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventTime + ProductCode: + - ams + Description_EN: The time the agent detected the event + Sample: + - 1657781088000 + DL_Type: real + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: logonUser + ProductCode: + - ams + Description_EN: The logon user name + Sample: + - root + - SISTEMA + - oracle + DL_Type: dynamic + DL_CommonKey: + - UserAccount + DL_Searchable: true + DL_Aggregable: true +- Name: objectFileHashSha256 + ProductCode: + - ams + Description_EN: The SHA256 hash of target process image or target file + Sample: + - 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8 + - 49fa3e206abf6a1f4546417dbe09f3f06b38847866a4a66de75bd90f39cb6c1c + - 0969321ad5a0923f0f03896ad2c10e49290515c44b721d773942a37f62a24893 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: objectFilePath + ProductCode: + - ams + Description_EN: The file path of the target process image or target file + Sample: + - /usr/bin/bash + - /bin/bash + - /opt/folder1/probes/system/processes/processes + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: pname + ProductCode: + - ams + Description_EN: Internal product ID (Deprecated, use productCode) + Sample: + - '2200' + - '751' + - '533' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: request + ProductCode: + - ams + Description_EN: Request URL + Sample: + - http://10.10.10.10/fake/site + - http:///fake/param.cgi?action=list&group=Alarm.Status + - http://fake.com/ + DL_Type: string + DL_CommonKey: + - URL + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashSha256 + ProductCode: + - ams + Description_EN: The SHA256 hash of source file + Sample: + - 4eaa002225f4ea2dedcd19b7f1337d7c58ea7dd6d4571c12468dde95e6bcfdaf + - e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80 + - 16b20a3ad485b4fbbe3028c7e743b226db21ea93cacc8b3d7d7d4a731bf02333 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: srcFilePath + ProductCode: + - ams + Description_EN: The source file path + Sample: + - \\cnva-apps\megaclockprod\traveler\travelerprint.accdb + - c:\program files\common files\microsoft + shared\clicktorun\officesvcmgrschedule.xml + - q:\a7_dbs\a4_pkg\a4_packaging.accde + DL_Type: string + DL_CommonKey: + - FileFullPath + - FileName + DL_Searchable: true + DL_Aggregable: false +- Name: marsAccount + ProductCode: + - ams + Description_EN: The account for Trend Micro Mobile Apps Reputation Service + Sample: + - XDRv1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointModel + ProductCode: + - ams + Description_EN: The endpoint device model + Sample: + - Pixel 3 XL + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: userType + ProductCode: + - ams + Description_EN: The user type + Sample: + - Microsoft Endpoint Manager + - Azure Active Directory + - VMware Workspace ONE UEM + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventHashId + ProductCode: + - ams + Description_EN: The event hash ID + Sample: + - '-8406473586387535914' + - '138486453338666581' + - '-7909265752378976284' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstSeen + ProductCode: + - ams + Description_EN: The time when the event started (in milliseconds) + Sample: + - 1656355418449 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: lastSeen + ProductCode: + - ams + Description_EN: The time when the event ended (in milliseconds) + Sample: + - 1656355418449 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: pver + ProductCode: + - ams + Description_EN: The product version + Sample: + - 1.2.0.2752 + - 1.0.345 + - 1.2.0.2657 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: osName + ProductCode: + - ams + Description_EN: The host operating system name + Sample: + - Windows + - Linux + - macOS + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: osVer + ProductCode: + - ams + Description_EN: The OS version + Sample: + - Amazon Linux 2 + - 10.0.19044 + - 10.0.19042 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectHashId + ProductCode: + - ams + Description_EN: The event object hash ID + Sample: + - '8576474808125313522' + - '-599270888483415002' + - '2177864258235728980' + - '2432229257' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileSize + ProductCode: + - ams + Description_EN: The target file size + Sample: + - '0' + - '59456' + - '60' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileCreation + ProductCode: + - ams + Description_EN: The time the target file was created (in milliseconds) + Sample: + - '1652131848000' + - '1577865600000' + - '1648279273000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFileModifiedTime + ProductCode: + - ams + Description_EN: The modification time of the target file (in milliseconds) + Sample: + - '1652131848000' + - '1577865600000' + - '1648279273000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectFirstSeen + ProductCode: + - ams + Description_EN: The time when the object first appeared (in milliseconds) + Sample: + - '1656458063638' + - '1656260547165' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectLastSeen + ProductCode: + - ams + Description_EN: The time when the object was last seen (in milliseconds) + Sample: + - '1656458354730' + - '1656260580722' + - '0' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileHashId + ProductCode: + - ams + Description_EN: The source file hash ID + Sample: + - '1102079405020678318' + - '-6926286289273504319' + - '8528955148329941480' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileSize + ProductCode: + - ams + Description_EN: The source file size + Sample: + - '0' + - '131072' + - '196608' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileCreation + ProductCode: + - ams + Description_EN: The time when the source file was created (in milliseconds) + Sample: + - '1577865600000' + - '1626201752000' + - '1626201750000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFileModifiedTime + ProductCode: + - ams + Description_EN: The time when the source file was modified (in milliseconds) + Sample: + - '1626201752000' + - '1626201750000' + - '1577865600000' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcFirstSeen + ProductCode: + - ams + Description_EN: The time when the source file first appeared (in milliseconds) + Sample: + - '0' + - '1656355418449' + - '1656714760440' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: srcLastSeen + ProductCode: + - ams + Description_EN: The time when the source file was last seen (in milliseconds) + Sample: + - '0' + - '1656355418449' + - '1656715147313' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appOrSystemEventHashId + ProductCode: + - ams + Description_EN: The event object hash ID + Sample: + - 3859886410 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appLabel + ProductCode: + - ams + Description_EN: The app name (if the subject is an app) + Sample: + - Collection Nes Games + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: appPkgName + ProductCode: + - ams + Description_EN: The app package name (if the subject is an app) + Sample: + - com.ConsolesXX.CollectionNesGames + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: appPublicKeySha1 + ProductCode: + - ams + Description_EN: The SHA-1 hash of the app public key (if the subject is an + app) + Sample: + - 05FC638156219800DADAC48D8E621E0BCBD3C321 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: appSize + ProductCode: + - ams + Description_EN: The app size (in bytes) if the subject is an app + Sample: + - 16906043 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appIsSystem + ProductCode: + - ams + Description_EN: Whether the app is a system app + Sample: + - false + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: appVerCode + ProductCode: + - ams + Description_EN: The app version code (if the subject is an app) + Sample: + - 0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: systemEventAttr + ProductCode: + - ams + Description_EN: The attributes of the system event (if the subject is a system + event) + Sample: + - usbdebugging + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppDexSha256 + ProductCode: + - ams + Description_EN: The SHA-256 hash of the app Dex value + Sample: + - C23A87B77B06442FD9AF9A80DD87191EDEADFAB766C862EBC592FE18063D0449 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: true +- Name: objectAppInstalledTime + ProductCode: + - ams + Description_EN: The time of app installation (in milliseconds) + Sample: + - 1607935850 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppLabel + ProductCode: + - ams + Description_EN: The app name + Sample: + - Collection Nes Games + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: objectAppPackageName + ProductCode: + - ams + Description_EN: The app package name + Sample: + - com.ConsolesXX.CollectionNesGames + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: objectAppPublicKeySha1 + ProductCode: + - ams + Description_EN: The SHA-1 hash of the app public key + Sample: + - 05FC638156219800DADAC48D8E621E0BCBD3C321 + DL_Type: string + DL_CommonKey: + - FileSHA1 + DL_Searchable: true + DL_Aggregable: true +- Name: objectAppSha256 + ProductCode: + - ams + Description_EN: The SHA-256 hash of the app + Sample: + - 692BC8E6BC51807A24BEACC13ED2B68E1F954E152863430E3179FA812937B8B0 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: true +- Name: objectAppSize + ProductCode: + - ams + Description_EN: The app size (in bytes) + Sample: + - 16906043 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppIsSystemApp + ProductCode: + - ams + Description_EN: Whether the app is a system app + Sample: + - true + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppVerCode + ProductCode: + - ams + Description_EN: The app version code + Sample: + - 0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppVerName + ProductCode: + - ams + Description_EN: The app version + Sample: + - 1.0 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppBehavior + ProductCode: + - ams + Description_EN: The activity that occurred on the app + Sample: + - GRANTED_CAMERA_PERMISSION + - APP_NO_ICON + - APP_HIDE_ICON + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectAppBehaviorAttr + ProductCode: + - ams + Description_EN: The attributes of the app activity + Sample: + - android.intent.action.BOOT_COMPLETED + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectSystemEventAttr + ProductCode: + - ams + Description_EN: The system event attributes + Sample: + - LOCK_SCREEN + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: extraInfo + ProductCode: + - ams + Description_EN: The extra information about the app + Sample: + - N/A + - Web Client Common + - DCERPC Services + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: objectCertAttr + ProductCode: + - ams + Description_EN: The SHA-1 hash of the certificate public key + Sample: + - 05FC638156219800DADAC48D8E621E0BCBD3C321 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Others/TXOne EdgeOne.yaml b/doc_v2/Others/TXOne EdgeOne.yaml new file mode 100644 index 0000000..2a14282 --- /dev/null +++ b/doc_v2/Others/TXOne EdgeOne.yaml @@ -0,0 +1,456 @@ +- Name: hostName + ProductCode: + - pdi + - xns + - sds + - pds + - ptn + Description_EN: The computer name of the client host (The hostname from the + suspicious URL detected by Deep Discovery Inspector) + Sample: + - Let's Encrypt + - 10.10.10.10 + DL_Type: string + DL_CommonKey: + - DomainName + - HostDomain + DL_Searchable: true + DL_Aggregable: true +- Name: src + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The source IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dst + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - sig + - ptn + - szn + - scs + - mns + Description_EN: The destination IP + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: interestedIp + ProductCode: + - sds + - pdi + - xns + - pds + - sao + - ptp + - stp + - ptn + Description_EN: The IP of the interestedHost + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: false +- Name: endpointIp + ProductCode: + - sds + - pds + - sao + - ptp + - stp + - ptn + - sss + - ddr + Description_EN: The IP address of the endpoint on which the event was detected + Sample: + - 10.10.10.10 + DL_Type: dynamic + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: dpt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The destination port + Sample: + - 0 + - 445 + - 80 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: spt + ProductCode: + - pdi + - xns + - sao + - sds + - ptp + - pds + - stp + - xes + - ptn + - szn + - scs + - mns + Description_EN: The source port + Sample: + - 53 + - 0 + - 7680 + DL_Type: int + DL_CommonKey: + - Port + DL_Searchable: true + DL_Aggregable: true +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: remarks + ProductCode: + - sds + - pdi + - xns + - pds + - sca + - sao + - sem + - stp + - ptn + - xms + - sfs + - sss + Description_EN: The additional information + Sample: + - 'warning: fork: Resource temporarily unavailable' + - 'pam_unix(cron:session): session opened for user root by (uid=0)' + - "WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: + EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. + [CLIENT: 10.10.10.10] " + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: act + ProductCode: + - scs + - pdi + - xns + - sao + - sds + - sca + - ptp + - xes + - sws + - sem + - pds + - stp + - sig + - ptn + - szn + - xms + - ams + - mns + - sss + Description_EN: The actions taken to mitigate the event + Sample: + - log + - isolate + - terminate + - not blocked + - Block + - No action + - Reset + - Pass + - User Decision + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: policyName + ProductCode: + - sao + - sca + - sws + - sem + - sig + - ptn + - scs + - mns + Description_EN: The name of the triggered policy + Sample: + - Steelcase + - Cabot + - Tigre - Medium Policy + - apiPostedPolicy + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: majorVirusType + ProductCode: + - pds + - sds + - ams + - ptn + - pts + - sfc + Description_EN: The virus type + Sample: + - Virus + - Suspicious Activity + - Trojan + - TROJ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: cnt + ProductCode: + - pdi + - xns + - ptn + - mns + Description_EN: The total number of logs + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: direction + ProductCode: + - sao + - ptn + Description_EN: The direction + Sample: + - Incoming + - Outgoing + - Unknown + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: dmac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The MAC address of the destination IP (dest_ip) + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointMacAddress + ProductCode: + - sao + - ptn + - pts + Description_EN: The MAC address of endpoint + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: filterName + ProductCode: + - sca + - sem + - sao + - ptn + Description_EN: The filter name + Sample: + - ConnectionFilter + - Virtual Analyzer + - Data Loss Prevention + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: filterType + ProductCode: + - sao + - ptn + Description_EN: The filter type + Sample: + - Spam filter + - Size filter + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: interestedMacAddress + ProductCode: + - sao + - pdi + - xns + - ptn + Description_EN: The MAC address identified as the log owner's + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: proto + ProductCode: + - sds + - pds + - ptn + - scs + - mns + Description_EN: The exploited layer network protocol + Sample: + - '6' + - TCP + - '17' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: smac + ProductCode: + - pdi + - xns + - sao + - sds + - pds + - ptn + Description_EN: The source MAC address + Sample: + - 00:11:22:33:44:55 + - 66:77:88:99:AA:BB + - CC:DD:EE:FF:00:11 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vLANId + ProductCode: + - pdi + - xns + - ptn + - mns + Description_EN: The virtual LAN ID + Sample: [] + DL_Type: int + DL_CommonKey: + DL_Searchable: false + DL_Aggregable: false +- Name: ruleId64 + ProductCode: + - ptn + - mns + Description_EN: The IPS rule ID + Sample: + - '1134268' + - '4026531849' + - '4026531852' + DL_Type: long + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Others/TXOne StellarOne.yaml b/doc_v2/Others/TXOne StellarOne.yaml new file mode 100644 index 0000000..4711184 --- /dev/null +++ b/doc_v2/Others/TXOne StellarOne.yaml @@ -0,0 +1,371 @@ +- Name: endpointHostName + ProductCode: + - sds + - pds + - sao + - xes + - sig + - ams + - szn + - pts + - scs + - sss + - ddr + Description_EN: The endpoint hostname or node where the event was detected + Sample: + - 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0] + - ip-10-10-10-10.us-west-1.compute.internal + DL_Type: string + DL_CommonKey: + - EndpointName + DL_Searchable: true + DL_Aggregable: true +- Name: endpointGUID + ProductCode: + - sds + - sao + - pds + - xes + - sig + - ams + - szn + - pts + - scs + - ddr + Description_EN: The GUID of the agent which reported the detection + Sample: + - ae4d64aa-f8b8-bb36-b265-f59272ed342f + - 8fb979f6-1376-bed3-227f-f2886e66194e + - ca2b3a7e-8415-c571-cc19-e45f69470026 + DL_Type: string + DL_CommonKey: + - EndpointID + DL_Searchable: true + DL_Aggregable: true +- Name: fileName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sig + - pts + - sfs + - sfc + - sss + Description_EN: The file name + Sample: + - spoolss + - hosts + - svcrestarttask + DL_Type: dynamic + DL_CommonKey: + - FileName + DL_Searchable: true + DL_Aggregable: true +- Name: filePath + ProductCode: + - sds + - pds + - sao + - pdi + - xns + - pts + - sfs + - sfc + Description_EN: The file path without the file name + Sample: + - security + - /var/log/audit/audit.log + - application + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: true +- Name: filePathName + ProductCode: + - sds + - pdi + - xns + - pds + - pts + Description_EN: The file path with the file name + Sample: + - vss + - spoolss + - /etc/hosts + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: techniqueId + ProductCode: + - pts + - pdi + - xns + Description_EN: Technique ID detected by the product agent base on a detection + rule + Sample: [] + DL_Type: dynamic + DL_CommonKey: + - Technique + DL_Searchable: true + DL_Aggregable: false +- Name: malName + ProductCode: + - sao + - sds + - pdi + - xns + - pds + - sws + - pts + - xms + - sfs + - sfc + - sss + - scs + Description_EN: The name of the detected malware + Sample: + - SecurityLevelDrop + - Regla Logs All + - USR_SUSPICIOUS_DOMAIN.UMXX + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - ptp + - sca + - sem + - xes + - stp + - sig + - ptn + - szn + - pts + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event type + Sample: + - LOG_INSPECTION_EVENT + - SECURITY_RISK_DETECTION + - WEB_THREAT_DETECTION + - LOG_INSPECTION_EVENT + - MALWARE_DETECTION + - PROCESS_ACTIVITY + - WEB_POLICY_VIOLATION + - DEEP_PACKET_INSPECTION_EVENT + - INTEGRITY_MONITORING_EVENT + - DISRUPTIVE_APPLICATION_DETECTION + - PRODUCT_SUMMARY + - PRODUCT_UPDATE + - BEHAVIORAL_VIOLATION + - FIREWALL_POLICY_VIOLATION + - SUSPICIOUS_BEHAVIOUR_DETECTION + - DENYLIST_CHANGE + - MACHINE_LEARNING_DETECTION + - DLP_VIOLATION + - MALWARE_OUTBREAK_DETECTION + - SENSITIVE_DATA_DETECTION + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: fullPath + ProductCode: + - sds + - sao + - pdi + - xns + - pds + - pts + - sfs + - sfc + - sss + - scs + Description_EN: The combination of the file path and the file name + Sample: + - \etc\hosts + - c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask + - \var\log\auth.log + DL_Type: string + DL_CommonKey: + - FileFullPath + DL_Searchable: true + DL_Aggregable: false +- Name: parentFileHashSha256 + ProductCode: + - xes + - pts + Description_EN: The SHA-256 of the subject parent process + Sample: + - 14A1223722D486ABBC88682AB49AF8E56DC65AC4E153027985BFFFF7C815C0EC + - 2EF51284CA9211ADEC3E8E095F386FEC742E0532075894AE99024C65949F935E + - F3FEB95E7BCFB0766A694D93FCA29EDA7E2CA977C2395B4BE75242814EB6D881 + DL_Type: string + DL_CommonKey: + - FileSHA2 + DL_Searchable: true + DL_Aggregable: false +- Name: actResult + ProductCode: + - sao + - sca + - sds + - pds + - pts + - ams + Description_EN: The result of an action + Sample: + - Dropped + - Successful + - Accepted + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: majorVirusType + ProductCode: + - pds + - sds + - ams + - ptn + - pts + - sfc + Description_EN: The virus type + Sample: + - Virus + - Suspicious Activity + - Trojan + - TROJ + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: aggregatedCount + ProductCode: + - pdi + - xns + - sao + - ptp + - sws + - stp + - sig + - pts + - ddr + - sds + Description_EN: The number of aggregated events + Sample: + - '1' + - '2' + - '3' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: endpointMacAddress + ProductCode: + - sao + - ptn + - pts + Description_EN: The MAC address of endpoint + Sample: + - 00:00:00:00:00:00 + - ff:ff:ff:ff:ff:ff + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventId + ProductCode: + - sds + - pdi + - xns + - sao + - pds + - sca + - xes + - sem + - pts + - scs + - xms + - sfs + - sfc + - sss + - ams + - mns + - ddr + Description_EN: The event ID from the logs of each product + Sample: + - 100100 + - 100101 + - 100116 + - 100117 + - 100119 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSubId + ProductCode: + - sds + - pts + Description_EN: The access type + Sample: + - '4' + - '101' + - '102' + DL_Type: int + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: firstSeen + ProductCode: + - sca + - pts + - ddr + Description_EN: The first time the XDR log appeared + Sample: + - 1657195233000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: lastSeen + ProductCode: + - sca + - pts + - ddr + Description_EN: The last time the XDR log appeared + Sample: + - 1657195233000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: quarantineFileName + ProductCode: + - pts + Description_EN: The file path of the quarantined object + Sample: + - C:\Program + Files\TXOne\StellarProtect\private\quarantine\00000000-0000-0000-0000-000000000000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Others/Trend Cloud One - AWS CloudTrail Integration.yaml b/doc_v2/Others/Trend Cloud One - AWS CloudTrail Integration.yaml new file mode 100644 index 0000000..6c5d1d1 --- /dev/null +++ b/doc_v2/Others/Trend Cloud One - AWS CloudTrail Integration.yaml @@ -0,0 +1,275 @@ +- Name: eventID + ProductCode: + - sct + Description_EN: GUID generated by AWS CloudTrail to identify events + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventName + ProductCode: + - sct + Description_EN: The name of the log event + Sample: + - PutObject + - GetObject + - DescribeTable + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: eventSource + ProductCode: + - sct + Description_EN: The AWS service the request was made to + Sample: + - s3.amazonaws.com + - dynamodb.amazonaws.com + - xray.amazonaws.com + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: readOnly + ProductCode: + - sct + Description_EN: Whether the operation is read-only + Sample: + - true + - false + DL_Type: bool + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: requestParameters + ProductCode: + - sct + Description_EN: The parameters, if any, that were sent with the request + (Parameters are documented in the API reference docs for the appropriate AWS + service) + Sample: + - '{"durationSeconds": 3600, "roleSessionName":"BackplaneAssumeRoleSession"}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: resources + ProductCode: + - sct + Description_EN: List of resources accessed in the event + Sample: + - '[{"type":"AWS::S3::Object","ARN":"arn:aws:s3:::your-bucket/file.txt"}]' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: responseElements + ProductCode: + - sct + Description_EN: Response elements for actions that made changes (create, + update, or delete actions) + Sample: + - '{"user":{"createDate":"Mar 24, 2014 9:11:59 PM","userName":"Bob","arn":"arn:aws:iam::123456789012:user/Bob","path":"/","userId":"EXAMPLEUSERID"}}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sourceIPAddress + ProductCode: + - sct + Description_EN: IP address the request was made from (For actions that + originate from the service console, the address reported is for the + underlying customer resource, not the console web server. For services in + AWS, only the DNS name is displayed.) + Sample: + - 10.10.10.10 + - apigateway.amazonaws.com + - config.amazonaws.com + DL_Type: string + DL_CommonKey: + - IPv4 + - IPv6 + DL_Searchable: true + DL_Aggregable: true +- Name: userAgent + ProductCode: + - sct + Description_EN: The user agent or the agent through which the request was made + Sample: + - signin.amazonaws.com + - console.amazonaws.com + - aws-cli/1.3.23 Python/2.7.6 Linux/2.6.18-164.el5 + DL_Type: string + DL_CommonKey: + - CLICommand + DL_Searchable: true + DL_Aggregable: false +- Name: userIdentity + ProductCode: + - sct + Description_EN: Information about the user that made a request + Sample: + - '{"type":"AWSService","invokedBy":"apigateway.amazonaws.com"}' + - '{"type":"AWSService","invokedBy":"lambda.amazonaws.com"}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: vpcEndpointId + ProductCode: + - sct + Description_EN: VPC endpoint in which requests were made from a VPC to another + AWS service (Such as Amazon S3) + Sample: + - vpce-00000000000000000 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: true +- Name: additionalEventData + ProductCode: + - sct + Description_EN: The additional data about the event that was not part of the + request + Sample: + - '{"SignatureVersion":"SigV4","CipherSuite":"ECDHE-RSA-AES128-GCM-SHA256"}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: apiVersion + ProductCode: + - sct + Description_EN: API version associated with the AwsApiCall eventType value + Sample: + - 2012-08-10 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: awsRegion + ProductCode: + - sct + Description_EN: AWS region that the request was made to + Sample: + - us-east-1 + - us-east-2 + - us-west-1 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: errorCode + ProductCode: + - sct + Description_EN: AWS service error code + Sample: + - ThrottlingException + - InvalidParameterValueException + - NoSuchLifecycleConfiguration + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: errorMessage + ProductCode: + - sct + Description_EN: Description of the error + Sample: + - The specified bucket does not have a website configuration + - An unknown error occurred + - The lifecycle configuration does not exist + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventTime + ProductCode: + - sct + Description_EN: The time the agent or product detected the event + Sample: + - 2022-07-06T22:28:06Z + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventCategory + ProductCode: + - sct + Description_EN: Event category used in LookupEvents calls + Sample: + - Management + - Data + - Insight + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventType + ProductCode: + - sct + Description_EN: Type of event that generated the event record + Sample: + - AwsApiCall + - AwsServiceEvent + - AwsConsoleAction + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: eventVersion + ProductCode: + - sct + Description_EN: Version of the log event format + Sample: + - 1.08 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: recipientAccountId + ProductCode: + - sct + Description_EN: Account ID that received the event + Sample: + - 123456789012 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: requestID + ProductCode: + - sct + Description_EN: Value that identifies the request (The service being called + generates this value) + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: sharedEventID + ProductCode: + - sct + Description_EN: GUID generated by AWS CloudTrail to uniquely identify + CloudTrail events (From the same AWS action that is sent to different AWS + accounts) + Sample: + - 11111111-1111-1111-1111-111111111111 + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false +- Name: serviceEventDetails + ProductCode: + - sct + Description_EN: The service event (including what triggered the event and the + result) + Sample: + - '{"lifecycleEventPolicy":{"policyVersion":1,"policyId":"11111111-1111-1111-1111-111111111111"}}' + DL_Type: dynamic + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/doc_v2/Others/Trend Micro Deep Discovery Director Network Analytic SaaS.yaml b/doc_v2/Others/Trend Micro Deep Discovery Director Network Analytic SaaS.yaml new file mode 100644 index 0000000..7c8fdf0 --- /dev/null +++ b/doc_v2/Others/Trend Micro Deep Discovery Director Network Analytic SaaS.yaml @@ -0,0 +1,12 @@ +- Name: flowId + ProductCode: + - sna + Description_EN: The connection ID + Sample: + - '6717474604962545666' + - '6915244861077872618' + - '6915244908215815814' + DL_Type: string + DL_CommonKey: + DL_Searchable: true + DL_Aggregable: false diff --git a/pages/Cloud/Agentless Vulnerability & Threat Detection.md b/pages/Cloud/Agentless Vulnerability & Threat Detection.md new file mode 100644 index 0000000..e02af85 --- /dev/null +++ b/pages/Cloud/Agentless Vulnerability & Threat Detection.md @@ -0,0 +1,1059 @@ +--- +layout: default +title: Agentless Vulnerability & Threat Detection - Cloud +--- + +# Agentless Vulnerability & Threat Detection +**Layer:** Cloud + +This documentation provides detailed information about all fields available for Agentless Vulnerability & Threat Detection. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
azIdstring-The virtual machine Availability Zone ID +
    +
  • us-east-1b
  • +
  • us-west-2a
  • +
+
Agentless Vulnerability & Threat Detection
cloudAccountIdstring-The AWS cloud account ID, Google Cloud product ID, or Azure subscription ID +
    +
  • 123456789012
  • +
  • 00000000-0000-0000-0000-000000000000
  • +
  • ocid1.compartment.oc1..aaaaaaaa54yuau7prqquu3gqs4jcjzvz2yf7vwlqnkqlixq5tcjsdezqmyua
  • +
+
+
    +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
cloudMachineImageIdstring-The cloud machine image ID +
    +
  • ami-092d1c9fb626c2ba7
  • +
  • 3111106172944240963
  • +
  • Oracle-Linux-9.5-aarch64-2025.05.19-0
  • +
  • ubuntu_22_04_x64_20G_alibase_20250113.vhd
  • +
+
Agentless Vulnerability & Threat Detection
cloudMachineImageNamestring-The cloud machine image name +
    +
  • Windows_Server-2022-English-Full-SQL_2022_Standard-2024.05.15
  • +
  • https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/debian-12-bookworm-v20240617
  • +
+
Agentless Vulnerability & Threat Detection
cloudProviderstring-The service provider of the cloud asset +
    +
  • alibaba cloud
  • +
  • aws
  • +
  • azure
  • +
  • gcp
  • +
  • oci
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
cloudResourceDigeststring-The cloud resource digest +
    +
  • sha256:e8759728bdf756c2546bf88d772634d4b746ba2be6da74cb68d2a75fb135e29e
  • +
  • Z29gD6/9+UmEejeSqt4zcqux+1nNIRdGhoffijjkaBc=
  • +
+
Agentless Vulnerability & Threat Detection
cloudResourceIdstring-The cloud resource ID +
    +
  • vol-00000000000000000
  • +
  • 123456789012.dkr.ecr.us-west-1.amazonaws.com/us-west-1-sentry-scan-samples-ecr
  • +
  • arn:aws:lambda:us-east-1:000000000000:function:StackSet-SentrySetdb47aff3-cc084aaa-5-sideScanVuln-6Dyn7ZcwCSPw
  • +
  • 6132111784399111342
  • +
  • us-east1-docker.pkg.dev/987654321012/ebsscan/ebsscanfunction@sha256:49eb55144d868a5bea1487e35837115f51eb158361c2c11beb6935667a04c489
  • +
  • /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/csf-test-data/providers/Microsoft.Compute/disks/csf-test-shared-ssd
  • +
  • ocid1.volume.oc1.iad.abuwcljsobhbezpfpgajgxecncmdjxxq5yiyimx4tdtzm33gawvhvfvn62iq
  • +
+
Agentless Vulnerability & Threat Detection
cloudResourceTagsstring-The cloud resource tags +
    +
  • {'imageTags': ['latest', 'Tag1', 'Tag2']}
  • +
  • {'tags': {'Service': 'S3 Updater', 'Department': 'Finance', 'Application': 'Accounting'}}
  • +
  • {'CloudResourceTags': [{'Key': 'cost_tag', 'Value': 'Department 123'}]}
  • +
  • {'ImageTags': ['latest']}
  • +
+
Agentless Vulnerability & Threat Detection
cloudResourceTypestring-The cloud resource type +
    +
  • alibaba-cloud-repository-image
  • +
  • azure-repository-image
  • +
  • disk
  • +
  • ebs-volume
  • +
  • ecr-repository-image
  • +
  • lambda-function
  • +
  • lambda-layer
  • +
  • google-cloud-repository-image
  • +
  • oracle-cloud-repository-image
  • +
+
Agentless Vulnerability & Threat Detection
cloudResourceVersionstring-The cloud resource version113Agentless Vulnerability & Threat Detection
compressedFileHashstringFileSHA1The SHA-1 of the decompressed archive +
    +
  • 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA
  • +
  • FA71B59F35F0EE44D27F74917EF5A0DA2797E80B
  • +
  • 14D2302172EB81465CE12E01361AE24CDE170F7B
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileHashSha256stringFileSHA2The SHA-256 of the compressed suspicious file +
    +
  • 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F
  • +
  • 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE
  • +
  • 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileNamestringFileNameThe file name of the compressed file +
    +
  • /proc/32058/fd/150
  • +
  • NONAMEFL
  • +
  • /proc/10006/fd/30
  • +
  • VirusActionSample/RPF2_OtherMalwareSample-other.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
compressedFileTypestring-The file type of the decompressed archive file +
    +
  • EXE
  • +
  • JAVA
  • +
  • PDF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
diskPartitionIdstring-The cloud volume partition ID +
    +
  • 1
  • +
  • 2
  • +
+
Agentless Vulnerability & Threat Detection
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the endpoint on which the event was detected10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubNamestring-The event type sub-name +
    +
  • IPS Detection
  • +
  • Personal Firewall
  • +
  • Attack Discovery
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileSizestring-The file size of the suspicious file +
    +
  • 0
  • +
  • 1255856
  • +
  • 1237880
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileSystemUuidstring-The file system UUID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
Agentless Vulnerability & Threat Detection
fileTypestring-The file type of the suspicious file +
    +
  • EXE
  • +
  • LNK
  • +
  • MIME
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
instanceIdstring-The ID of the instance that indicates the meta-cloud or data center VM +
    +
  • 52294e7b-f732-c6e9-b2c3-7a6b6f50d101
  • +
  • 00030912-c5e7-4348-9012-7c684751c531
  • +
  • 0008ae58-db0c-34ee-3e5c-5dfc9b10a739
  • +
  • i-0b22a22eec53b9321
  • +
  • /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0
  • +
  • ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Network Security
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
osNamestring-The host OS name +
    +
  • Linux
  • +
  • windows 10.0.22000
  • +
  • windows 10.0.19044
  • +
  • windows 10.0.19043
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Data Detection and Response
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
regionCodestring-The cloud provider region codeus-east-1 +
    +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
threatTypestring-The log threat type +
    +
  • 2
  • +
  • 99
  • +
  • 5
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
vpcIdstring-The virtual private cloud that contains the cloud asset +
    +
  • vpc-01234567890abcdef
  • +
  • avtd-vnet-ozyww04h
  • +
  • ocid1.vnic.oc1.iad.abuwcljs4szq5rylkxikcthyegnqn5mjhkyn3xwtoa3uvbonxqn52nofibgq
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 37 +- **Layer:** Cloud +- **Product:** Agentless Vulnerability & Threat Detection + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Cloud/File Security Storage.md b/pages/Cloud/File Security Storage.md new file mode 100644 index 0000000..f1fcb19 --- /dev/null +++ b/pages/Cloud/File Security Storage.md @@ -0,0 +1,745 @@ +--- +layout: default +title: File Security Storage - Cloud +--- + +# File Security Storage +**Layer:** Cloud + +This documentation provides detailed information about all fields available for File Security Storage. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
awsResourceArnstring-The Amazon Resource Name +
    +
  • arn:aws:s3:::bucket-name/object-key
  • +
  • arn:aws:s3:::user-bucket-name/file-name
  • +
  • arn:aws:s3:::bucket-name/folder-name/file-name
  • +
+
File Security Storage
cloudAccountIdstring-The AWS cloud account ID, Google Cloud product ID, or Azure subscription ID +
    +
  • 123456789012
  • +
  • 00000000-0000-0000-0000-000000000000
  • +
  • ocid1.compartment.oc1..aaaaaaaa54yuau7prqquu3gqs4jcjzvz2yf7vwlqnkqlixq5tcjsdezqmyua
  • +
+
+
    +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
cloudProviderstring-The service provider of the cloud asset +
    +
  • alibaba cloud
  • +
  • aws
  • +
  • azure
  • +
  • gcp
  • +
  • oci
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
cloudStorageNamestring-The cloud storage namemy-bucketFile Security Storage
compressedFileHashstringFileSHA1The SHA-1 of the decompressed archive +
    +
  • 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA
  • +
  • FA71B59F35F0EE44D27F74917EF5A0DA2797E80B
  • +
  • 14D2302172EB81465CE12E01361AE24CDE170F7B
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileHashSha256stringFileSHA2The SHA-256 of the compressed suspicious file +
    +
  • 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F
  • +
  • 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE
  • +
  • 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileNamestringFileNameThe file name of the compressed file +
    +
  • /proc/32058/fd/150
  • +
  • NONAMEFL
  • +
  • /proc/10006/fd/30
  • +
  • VirusActionSample/RPF2_OtherMalwareSample-other.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
compressedFileSizestring-The file size of the decompressed archive file +
    +
  • 0
  • +
  • 265314
  • +
  • 175864
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
compressedFileTypestring-The file type of the decompressed archive file +
    +
  • EXE
  • +
  • JAVA
  • +
  • PDF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
filePathstringFileFullPathThe file path without the file name +
    +
  • security
  • +
  • /var/log/audit/audit.log
  • +
  • application
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
fileSizestring-The file size of the suspicious file +
    +
  • 0
  • +
  • 1255856
  • +
  • 1237880
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileTypestring-The file type of the suspicious file +
    +
  • EXE
  • +
  • LNK
  • +
  • MIME
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
majorVirusTypestring-The virus type +
    +
  • Virus
  • +
  • Suspicious Activity
  • +
  • Trojan
  • +
  • TROJ
  • +
+
+
    +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Mobile Security
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
  • File Security Storage
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
regionCodestring-The cloud provider region codeus-east-1 +
    +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 22 +- **Layer:** Cloud +- **Product:** File Security Storage + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Cloud/File Security.md b/pages/Cloud/File Security.md new file mode 100644 index 0000000..96d0bcc --- /dev/null +++ b/pages/Cloud/File Security.md @@ -0,0 +1,898 @@ +--- +layout: default +title: File Security - Cloud +--- + +# File Security +**Layer:** Cloud + +This documentation provides detailed information about all fields available for File Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
compressedFileHashstringFileSHA1The SHA-1 of the decompressed archive +
    +
  • 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA
  • +
  • FA71B59F35F0EE44D27F74917EF5A0DA2797E80B
  • +
  • 14D2302172EB81465CE12E01361AE24CDE170F7B
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileHashSha256stringFileSHA2The SHA-256 of the compressed suspicious file +
    +
  • 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F
  • +
  • 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE
  • +
  • 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileNamestringFileNameThe file name of the compressed file +
    +
  • /proc/32058/fd/150
  • +
  • NONAMEFL
  • +
  • /proc/10006/fd/30
  • +
  • VirusActionSample/RPF2_OtherMalwareSample-other.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
compressedFileSizestring-The file size of the decompressed archive file +
    +
  • 0
  • +
  • 265314
  • +
  • 175864
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
compressedFileTypestring-The file type of the decompressed archive file +
    +
  • EXE
  • +
  • JAVA
  • +
  • PDF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
confidenceint-The confidence rating returned from TrendX Hybrid Model (predictive machine learning). Values from 1-99.94 +
    +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
customTagsdynamic-The event tags +
    +
  • network
  • +
  • mitre_discovery
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
+
engTypestring-The engine type +
    +
  • Virus Scan Engine (Windows XP/Server 2003, x64)
  • +
  • Virus Scan NT Kernel Engine
  • +
  • Spyware/Grayware Scan Engine v.6 (64-bit)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
engVerstring-The engine version +
    +
  • 1.0.0.1123_1.0.0.1101
  • +
  • 9.0.1004
  • +
  • 22.540.1001
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
filePathstringFileFullPathThe file path without the file name +
    +
  • security
  • +
  • /var/log/audit/audit.log
  • +
  • application
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
fileSizestring-The file size of the suspicious file +
    +
  • 0
  • +
  • 1255856
  • +
  • 1237880
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileTypestring-The file type of the suspicious file +
    +
  • EXE
  • +
  • LNK
  • +
  • MIME
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
malFamilystring-The threat family +
    +
  • EQUATED
  • +
  • STARTER
  • +
  • 0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
malSubTypestring-The subsidiary virus typeUnknown +
    +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
malTypestring-The risk type for Network Content Correlation Engine rules +
    +
  • OTHERS
  • +
  • MALWARE
  • +
  • Others
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • File Security
  • +
  • Trend Vision One Container Security
  • +
+
malTypeGroupstring-The risk type group for NCCE (Network Content Correlation Engine) rules. This field comes from NCCP (Network Content Correlation Pattern) rule type definitions. +
    +
  • Others
  • +
  • Malware
  • +
  • Spyware
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
+
objectTypestring-The object type +
    +
  • file
  • +
  • process
  • +
  • qil
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • File Security
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
reportGUIDstring-The GUID for Workbench to request report page data +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • File Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 28 +- **Layer:** Cloud +- **Product:** File Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Cloud/Trend Vision One Container Security.md b/pages/Cloud/Trend Vision One Container Security.md new file mode 100644 index 0000000..ef7083a --- /dev/null +++ b/pages/Cloud/Trend Vision One Container Security.md @@ -0,0 +1,1724 @@ +--- +layout: default +title: Trend Vision One Container Security - Cloud +--- + +# Trend Vision One Container Security +**Layer:** Cloud + +This documentation provides detailed information about all fields available for Trend Vision One Container Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
clusterIdstring-The cluster ID of the containerTestCluster-2HJdImvH6eO1fgTnCBK3xYA7SphTrend Vision One Container Security
clusterIdstring-The cluster ID of the containerben_eks_test-20k90A3jGa4d3YMYfrdGIgs7g9uTrend Vision One Container Security
clusterNamestring-The cluster name of the containerTestClusterTrend Vision One Container Security
clusterNamestring-The cluster name of the containerben_eks_testTrend Vision One Container Security
compressedFileNamestringFileNameThe file name of the compressed file +
    +
  • /proc/32058/fd/150
  • +
  • NONAMEFL
  • +
  • /proc/10006/fd/30
  • +
  • VirusActionSample/RPF2_OtherMalwareSample-other.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
containerIdstring-The Kubernetes container ID7d1e00176d78Trend Vision One Container Security
containerIdstring-The Kubernetes container ID4102001853b8Trend Vision One Container Security
containerImagestring-The Kubernetes container imagedebian:latestTrend Vision One Container Security
containerImagestring-The Kubernetes container imagedockerhub.io/ubuntu:latestTrend Vision One Container Security
containerImageDigeststring-The Kubernetes container image digestsha256:bfe6615d017d1eebe19f349669de58cda36c668ef916e618be78071513c690e5Trend Vision One Container Security
containerImageDigeststring-The Kubernetes container image digestsha256:626ffe58f6e7566e00254b638eb7e0f3b11d4da9675088f4781a50ae288f3322Trend Vision One Container Security
containerNamestring-The Kubernetes container namek8s_democon_longrunl_default_11111111-1111-1111-1111-111111111111_0Trend Vision One Container Security
containerNamestring-The Kubernetes container namek8s_ubuntu_ubuntu-ds-fp2jk_default_00000000-0000-0000-0000-000000000000_2Trend Vision One Container Security
customAssetTagsdynamic-The list of custom asset tags{"os":["linux", "windows"], "org":["bu1"]}Trend Vision One Container Security
customAssetTagsdynamic-The list of custom asset tags{"os":["linux", "windows"], "org":["bu1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
customTagsdynamic-The event tags +
    +
  • network
  • +
  • mitre_discovery
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
+
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
dptintPortThe destination port number-Trend Vision One Container Security
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dststring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
Trend Vision One Container Security
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestring-The host name of the container or node +
    +
  • PHILIPSIBE09
  • +
  • WHAM6WK8XG2
  • +
  • MacBook-Pro-del-Meno
  • +
+
Trend Vision One Container Security
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
eventIdint-Event type-Trend Vision One Container Security
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubIdint-The access type +
    +
  • 2 - TELEMETRY_PROCESS_CREATE
  • +
  • 101 - TELEMETRY_FILE_CREATE
  • +
  • 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND
  • +
+
Trend Vision One Container Security
eventTimereal-The time the agent detected the event1657781088000Trend Vision One Container Security
fileDescstring-The file description +
    +
  • Atualiza PJRO
  • +
  • Carpeta de archivos
  • +
  • 7z Setup SFX (x86)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileTypestring-The file type of the suspicious file +
    +
  • EXE
  • +
  • LNK
  • +
  • MIME
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
k8sNamespacestring-The Kubernetes namespace of the containerdefaultTrend Vision One Container Security
k8sNamespacestring-The Kubernetes namespace of the containerdefaultTrend Vision One Container Security
k8sPodIdstring-The Kubernetes pod ID of the container11111111-1111-1111-1111-111111111111Trend Vision One Container Security
k8sPodIdstring-The Kubernetes pod ID of the container +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
Trend Vision One Container Security
k8sPodNamestring-The Kubernetes pod name of the containerlongrunlTrend Vision One Container Security
k8sPodNamestring-The Kubernetes pod name of the containerubuntu-ds-fp2jkTrend Vision One Container Security
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
malTypestring-The risk type for Network Content Correlation Engine rules +
    +
  • OTHERS
  • +
  • MALWARE
  • +
  • Others
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • File Security
  • +
  • Trend Vision One Container Security
  • +
+
objectFileNamestringFileNameThe object file name +
    +
  • powershell.exe
  • +
  • wmiprvse.exe
  • +
  • dismhost.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the target process image or target file +
    +
  • /usr/bin/bash
  • +
  • /bin/bash
  • +
  • /opt/folder1/probes/system/processes/processes
  • +
+
Trend Vision One Container Security
objectFilePathstringFileFullPathThe file path of the target process image or target file +
    +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • zwwritevirtualmemory
  • +
  • c:\windows\system32\wbem\wmiprvse.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
objectUserstringUserAccountThe owner name of the target process or the login user name +
    +
  • root
  • +
  • SYSTEM
  • +
  • oracle
  • +
+
Trend Vision One Container Security
osNamestring-The host operating system nameLinuxTrend Vision One Container Security
parentCmdstringCLICommandThe command line entry of the parent process +
    +
  • C:\WINDOWS\system32\services.exe
  • +
  • C:\Windows\system32\services.exe
  • +
  • /sbin/launchd
  • +
+
Trend Vision One Container Security
parentCmdstringCLICommandThe command line of the subject parent process +
    +
  • "C:\Tiburon\CommandCAD\Test\Startup.exe"
  • +
  • C:\WINDOWS\Explorer.EXE
  • +
  • C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s Appinfo
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
parentFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the parent process +
    +
  • c:\windows\system32\services.exe
  • +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
+
Trend Vision One Container Security
parentLaunchTimereal-The time when the parent process was launched +
    +
  • 1653614773895
  • +
  • 1656118625928
  • +
  • 0
  • +
+
Trend Vision One Container Security
parentNamestring-The image name of the parent process +
    +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\lsass.exe
  • +
+
Trend Vision One Container Security
parentNamestring-The image name of the parent process +
    +
  • explorer.exe
  • +
  • startup.exe
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
parentPidint-The PID of the parent process +
    +
  • 4
  • +
  • 1
  • +
  • 784
  • +
  • 792
  • +
+
Trend Vision One Container Security
parentPidint-The PID of the parent process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
platformAssetTagsdynamic-The list of platform custom asset tags{"Asset group":["finance"], "some.ip": ["10.1.0.1"]}Trend Vision One Container Security
platformAssetTagsdynamic-The list of platform custom asset tags{"Asset group":["finance"], "some.ip": ["10.1.0.1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
policyIdstring-The policy IDTestPolicy-2HJe25H4GY4upSuNNAG1pci2BImTrend Vision One Container Security
policyIdstring-The policy ID of which the event was detected +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 007
  • +
  • 003
  • +
  • TM000001
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
policyNamestring-The name of the triggered policyTestPolicyTrend Vision One Container Security
policyNamestring-The name of the triggered policy +
    +
  • Steelcase
  • +
  • Cabot
  • +
  • Tigre - Medium Policy
  • +
  • apiPostedPolicy
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
processCmdstringCLICommandCommand line entry of subject process +
    +
  • C:\WINDOWS\system32\services.exe
  • +
  • C:\Windows\system32\services.exe
  • +
  • /sbin/launchd
  • +
+
Trend Vision One Container Security
processCmdstringCLICommandThe subject process command line +
    +
  • "C:\Program Files (x86)\AADM\AADM.exe"
  • +
  • /usr/lib/inet/sendmail -bl -q15m
  • +
  • ComDir
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
processFilePathstringProcessFullPathThe file path of the subject process +
    +
  • c:\windows\system32\services.exe
  • +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
+
Trend Vision One Container Security
processImagePathstring-The process triggered by the file event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
processLaunchTimereal-The time the subject process was launched +
    +
  • 1653614773895
  • +
  • 1656118625928
  • +
  • 0
  • +
+
Trend Vision One Container Security
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\lsass.exe
  • +
+
Trend Vision One Container Security
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processPidint-The PID of the subject process +
    +
  • 4
  • +
  • 1
  • +
  • 784
  • +
  • 792
  • +
+
Trend Vision One Container Security
processPidint-The PID of the subject process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
protostring-The protocol type +
    +
  • TELEMETRY_CONNECTION_TCP
  • +
  • TELEMETRY_CONNECTION_UDP
  • +
+
Trend Vision One Container Security
protostring-The exploited layer network protocol +
    +
  • 6
  • +
  • TCP
  • +
  • 17
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
pverstring-The product version +
    +
  • 1.2.0.2752
  • +
  • 1.0.345
  • +
  • 1.2.0.2657
  • +
+
Trend Vision One Container Security
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
rawDataStrstring-The JSON string that contains additional information +
    +
  • {"TLS version": "0x0303", "Cipher Suite": "0xc030"}
  • +
  • {"Scanned ports": "23, 80, 443"}
  • +
  • {"HTTP Content-Type": "application/hal+json", "HTTP Content-Body": "{\\"_links\\": {\\"type\\": {\\"href\\": \\"http://10.10.10.10/rest/type/node/INVALID_VALUE\\"}}, \\"type\\": {\\"target_id\\": \\"article\\"}, \\"title\\": {\\"value\\": \\"My Article\\"}, \\"body\\": {\\"value\\": \\"\\"}}"}
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Vision One Container Security
  • +
  • Network Sensor
  • +
+
ruleIdStrstring-The rule IDTM-00000036Trend Vision One Container Security
ruleIdStrstring-The rule IDTM-00000043Trend Vision One Container Security
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleSetIdstring-The rule set IDAllRules-1zSSZPsDqfqkcOt5vNsD6f383HNTrend Vision One Container Security
ruleSetNamestring-The rule set nameAllRules +
    +
  • Trend Vision One Container Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
sourceTypestring-The source type +
    +
  • user defined
  • +
  • sandbox
  • +
  • syscall
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
  • Endpoint Sensor
  • +
+
sptintPortThe source port number +
    +
  • 53
  • +
  • 5353
  • +
  • 443
  • +
+
Trend Vision One Container Security
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
Trend Vision One Container Security
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The source file path +
    +
  • \\cnva-apps\megaclockprod\traveler\travelerprint.accdb
  • +
  • c:\program files\common files\microsoft shared\clicktorun\officesvcmgrschedule.xml
  • +
  • q:\a7_dbs\a4_pkg\a4_packaging.accde
  • +
+
Trend Vision One Container Security
tagsdynamic +
    +
  • Technique
  • +
  • Tactic
  • +
+
The detected ID based on the alert filter +
    +
  • MITREV9.T1057
  • +
  • MITREV9.T1059.003
  • +
  • XSAE.F2924
  • +
+
+
    +
  • ALL
  • +
  • Trend Vision One Container Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 89 +- **Layer:** Cloud +- **Product:** Trend Vision One Container Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Cloud/XDR for Cloud - AWS VPC Flow Logs.md b/pages/Cloud/XDR for Cloud - AWS VPC Flow Logs.md new file mode 100644 index 0000000..a073ef9 --- /dev/null +++ b/pages/Cloud/XDR for Cloud - AWS VPC Flow Logs.md @@ -0,0 +1,603 @@ +--- +layout: default +title: XDR for Cloud - AWS VPC Flow Logs - Cloud +--- + +# XDR for Cloud - AWS VPC Flow Logs +**Layer:** Cloud + +This documentation provides detailed information about all fields available for XDR for Cloud - AWS VPC Flow Logs. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actionstring-The traffic processing action +
    +
  • ACCEPT
  • +
  • REJECT
  • +
+
XDR for Cloud - AWS VPC Flow Logs
azIdstring-The Availability Zone IDapse2-az3XDR for Cloud - AWS VPC Flow Logs
bytesstring-The number of transmitted data bytes15044XDR for Cloud - AWS VPC Flow Logs
dptintPortThe service destination port of the private application server (dstport)443 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
dststring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP address (dstaddr)10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
endlong-The time when the last data packet was received (in Unix seconds)1616729349XDR for Cloud - AWS VPC Flow Logs
eventIdstring-The event ID +
    +
  • 200139
  • +
  • 200140
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
eventNamestring-The name of the log event +
    +
  • SWG_ACTIVITY_LOG
  • +
  • FIREWALL_ACTIVITY_LOG
  • +
  • VPC_ACTIVITY_LOG
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
eventTimereal-The time the agent or product detected the event1657135700000 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
flowDirectionstring-The network interface traffic direction +
    +
  • ingress
  • +
  • egress
  • +
  • I
  • +
  • O
  • +
+
+
    +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
flowTypestring-The type of traffic (type) +
    +
  • IPv4
  • +
  • IPv6
  • +
  • EFA
  • +
+
XDR for Cloud - AWS VPC Flow Logs
instanceIdstring-The instance IDi-01234567890abcdefXDR for Cloud - AWS VPC Flow Logs
logStatusstring-The VPC Flow Log status +
    +
  • OK
  • +
  • NODATA
  • +
  • SKIPDATA
  • +
+
XDR for Cloud - AWS VPC Flow Logs
packetsstring-The number of transmitted data packets14XDR for Cloud - AWS VPC Flow Logs
pktDstAddrstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The packet level destination IP10.10.10.10XDR for Cloud - AWS VPC Flow Logs
pktDstCloudServiceNamestring-The subset IP address range name for cloud service destination IP (pkt-dst-aws-service) +
    +
  • AMAZON
  • +
  • EC2
  • +
  • ROUTE53
  • +
+
XDR for Cloud - AWS VPC Flow Logs
pktSrcAddrstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The packet level source IP10.10.10.10XDR for Cloud - AWS VPC Flow Logs
pktSrcCloudServiceNamestring-The subset IP address range name for cloud service source IP (pkt-src-aws-service) +
    +
  • AMAZON
  • +
  • EC2
  • +
  • ROUTE53
  • +
+
XDR for Cloud - AWS VPC Flow Logs
pnamestring-The product name +
    +
  • Secure Web Gateway
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
sptintPortThe virtual port of the source assigned to the Secure Access Module (srcport)57763 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
srcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP address (srcaddr)10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
startreal-The time when the first data packet was received (in Unix seconds)1616729292XDR for Cloud - AWS VPC Flow Logs
subLocationIdstring-The sublocation ID +
    +
  • lz-0abcd123efg4567h
  • +
  • op-0abcd123efg4567h
  • +
  • wz-0abcd123efg4567h
  • +
+
XDR for Cloud - AWS VPC Flow Logs
subLocationTypestring-The sublocation type +
    +
  • wavelength
  • +
  • outpost
  • +
  • localzone
  • +
+
XDR for Cloud - AWS VPC Flow Logs
subnetIdstring-The subnet IDsubnet-01234567890abcdefXDR for Cloud - AWS VPC Flow Logs
tcpFlagsint-The bitmask value of the FIN/SYN/RST/SYN-ACK TCP flags +
    +
  • 1
  • +
  • 2
  • +
  • 4
  • +
  • 18
  • +
+
XDR for Cloud - AWS VPC Flow Logs
trafficPathint-The egress traffic path number +
    +
  • 1
  • +
  • 2
  • +
  • 8
  • +
+
XDR for Cloud - AWS VPC Flow Logs
vpcFlowLogsVersionint-The VPC Flow Logs version (version) +
    +
  • 2
  • +
  • 3
  • +
  • 4
  • +
  • 5
  • +
+
+
    +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
vpcIdstring-The VPC IDvpc-01234567890abcdefXDR for Cloud - AWS VPC Flow Logs
+
+ +## Field Statistics +- **Total Fields:** 29 +- **Layer:** Cloud +- **Product:** XDR for Cloud - AWS VPC Flow Logs + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Email/Collaboration sensor.md b/pages/Email/Collaboration sensor.md new file mode 100644 index 0000000..fd1ebbf --- /dev/null +++ b/pages/Email/Collaboration sensor.md @@ -0,0 +1,451 @@ +--- +layout: default +title: Collaboration sensor - Email +--- + +# Collaboration sensor +**Layer:** Email + +This documentation provides detailed information about all fields available for Collaboration sensor. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actionNamestring-The user or service actionUserLoggedInCollaboration sensor
actResultdynamic-The action resultSuccessCollaboration sensor
applicationIdstring-The application ID11111111-1111-1111-1111-111111111111Collaboration sensor
clientIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The client IP10.10.10.10Collaboration sensor
cloudStorageIdstring-The file or folder location ID11111111-1111-1111-1111-111111111111Collaboration sensor
cloudStorageNamestring-The file or folder URLhttps://test.trendmicro.com/sites/123Collaboration sensor
correlationIdstring-The correlation ID11111111-1111-1111-1111-111111111111Collaboration sensor
eventIdint-The event ID +
    +
  • 1 - MESSAGING_EMAIL_META
  • +
  • 2 - MESSAGING_COLLABORATION_ACTIVITY
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
  • Collaboration sensor
  • +
+
eventNamestring-The event typeCOLLABORATION_ACTIVITYCollaboration sensor
eventSubNamestring-The event type sub-name +
    +
  • Audit.Exchange
  • +
  • Audit.Sharepoint
  • +
  • Audit.General
  • +
+
Collaboration sensor
extraInfodynamic-The additional information about the sharing action<ClientType>SPHomePagesWeb</ClientType>Collaboration sensor
fileExtstring-The file extension (If the object is a folder, there is no value for this field.)jpgCollaboration sensor
fileNamestringFileNameThe file or folder nametest.pdfCollaboration sensor
isExternalAccessbool-Whether the cmdlet was run by an external user (True=external user, False=internal user in your organization)TrueCollaboration sensor
isSensitiveInfobool-Whether the event contains sensitive informationTrueCollaboration sensor
orgNamestring-The tenant nametest.trendmicro.comCollaboration sensor
originatingServerstring-The server where the operation originatedTY0PR03MB6449 (15.20.5746.023)Collaboration sensor
parametersstring-The names and values of all parameters used in the cmdlet identified in the Operations property[{"Name": "AlwaysDeleteOutlookRulesBlob","Value": "False"},{"Name" : "Force","Value": "False"}]Collaboration sensor
principalNamestringUserAccountThe User Principal Namesample_email@trendmicro.comCollaboration sensor
recordTypeint-The operation type +
    +
  • 1
  • +
  • 2
  • +
+
Collaboration sensor
servicestring-The Microsoft 365 service where the activity occurred +
    +
  • SecurityComplianceCenter
  • +
  • AzureActiveDirectory
  • +
  • SharePoint
  • +
+
Collaboration sensor
targetstring-The object accessed by a user or application +
    +
  • APCPR000000.PROD.OUTLOOK.COM/Microsoft Exchange Hosted
  • +
  • Organizations/test.trendmicro.com/test\\testRule001
  • +
+
Collaboration sensor
targetTypestring-The type of object that was accessed or modifiedFileCollaboration sensor
userAgentstring-The user agentMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Collaboration sensor
userSessionIdstring-The user session ID11111111-1111-1111-1111-111111111111Collaboration sensor
userTypestring-The user type +
    +
  • Regular
  • +
  • Reserved
  • +
  • Admin
  • +
+
Collaboration sensor
+
+ +## Field Statistics +- **Total Fields:** 26 +- **Layer:** Email +- **Product:** Collaboration sensor + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Email/Email Sensor.md b/pages/Email/Email Sensor.md new file mode 100644 index 0000000..16d8ce7 --- /dev/null +++ b/pages/Email/Email Sensor.md @@ -0,0 +1,1964 @@ +--- +layout: default +title: Email Sensor - Email +--- + +# Email Sensor +**Layer:** Email + +This documentation provides detailed information about all fields available for Email Sensor. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
attachmentdynamic-The information about the email attachment{"attachmentFileTlsh": "", "attachmentFileName": "testfile.txt","attachmentFileHash": "","attachmentFileSize": "-1"} +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashstringFileSHA1The SHA-1 of the email attachment +
    +
  • C9877617DB6715792F9D5C959C1E8D4E56D0C281
  • +
  • 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722
  • +
  • 0E56D9540B07ED15EF745348D35C72A6A00A0BD9
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileHashesdynamic-The SHA-1 of the email attachment +
    +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
  • 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashesdynamicFileSHA1SHA-1 hash of the email attachment +
    +
  • acedb7898338a46f38d148d1d0456e644576d41b
  • +
  • ea6fcc4c0c1f10d71742b29e98a977d995473dd1
  • +
  • 03d8fb85556edf397d8afcafc0b13f11ecbde50c
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashsdynamic-The SHA-1 hash value of the attachment file +
    +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
  • 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashSha256sdynamicFileSHA2SHA-256 hash of the email attachment +
    +
  • 0570dfd156ee00cb7bc2a94998157cb3a29292b9e9feed82d4b6c7d2c6bdd9d4
  • +
  • 2d96ebbbc5a5687b0f18fd5620e4e5489d49a877430146bbca447fabe9c47a6e
  • +
  • 20d27422610967122439735cbcb48e4382a16e94a8b29c068e6b7d0e40466427
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileNamedynamicFileNameThe file name of an attachment +
    +
  • Mail Body
  • +
  • image001.png
  • +
  • image002.png
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileNamedynamicFileNameFile name of the email attachment +
    +
  • image001.png
  • +
  • image002.png
  • +
  • image003.png
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileSizestring-The file size of the email attachment +
    +
  • 190843
  • +
  • 104454
  • +
  • 112197
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileSizesdynamic-The file size of email attachments +
    +
  • 190843
  • +
  • 104454
  • +
  • 112197
  • +
+
Email Sensor
attachmentFileTlshesdynamic-The TLSH of the email attachment +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileTlshesdynamic-The TLSH hash detected by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
attachmentFileTlshsdynamic-The TLSH hash value of the attachment file +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentMd5dynamicFileMD5MD5 hash of the email attachment +
    +
  • 003fa299ab119219596f952c68029810
  • +
  • 03aeabf6a745cb627ee29c05a22e58cb
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSha1dynamicFileSHA1SHA-1 hash of the email attachment +
    +
  • 03d8fb85556edf397d8afcafc0b13f11ecbde50c
  • +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSha256dynamicFileSHA2SHA-256 hash of the email attachment +
    +
  • 29d72af5608ee5eade7c4346d3c32dfcc6b54f8fb43d977ff0306ad68b255a01
  • +
  • cb0628092ddea96bb040221b5c793dbbb792a67d0621bdfba170c07374d85801
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSizedynamic-The attachment file size- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
attachmentSourcedynamic-The attachment source +
    +
  • TMASE
  • +
  • PRODUCT
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentTlshdynamic-The TLSH hash detected by Trend Micro Anti-Spam Engine +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 7C31C9827A71A905CC6B0A73B10FE80C06F01E814AA396347F8B6F979690E9C3D75147
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentUrlsdynamic-The URLs and URL sources extracted from the email attachment- +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
correlatedIntelligencedynamic-The Correlated Intelligence detection{"risk_type": "Anomaly","matched_rules": [{"threat_type": "Possibly Unwanted Email","matched_filters": [{"id":"FIL013", "name": "Marketing Email Traits"},{"id":"FIL098", "name": "Infrequent Sender Email Domain"}],"name": "Possibly Unwanted Marketing Email","id": "AN004"}]} +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
duserdynamicEmailRecipientThe email recipient +
    +
  • (no user)
  • +
  • SYSTEM
  • +
  • SYSTEM
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdint-The event ID +
    +
  • 1 - MESSAGING_EMAIL_META
  • +
  • 2 - MESSAGING_COLLABORATION_ACTIVITY
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
  • Collaboration sensor
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventTimereal-The time the agent detected the event1657135700000 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
groupIdstring-The group ID for the management scope filter11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
highlightedFileHashesdynamicFileSHA1The SHA-1 hashes of the highlighted file +
    +
  • C9877617DB6715792F9D5C959C1E8D4E56D0C281
  • +
  • 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722
  • +
  • 0E56D9540B07ED15EF745348D35C72A6A00A0BD9
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
highlightedFileNamedynamic-The file names of suspicious attachments +
    +
  • detect_me.zip
  • +
  • covid.zip
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailAttachmentHashstringFileMD5Hash value of the email attachment +
    +
  • 02ab50ee0bccadb43d6cc504928f2ff2
  • +
  • 0a0f335fb04f1acebb7500d5358321c0
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailBccAddressesdynamicEmailRecipientMail BCC address in the email headersample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailboxstring-The mailbox that is protected by Trend Microsample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Mobile Security
  • +
  • Email Sensor
  • +
+
mailboxstring-Primary email addresssample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailCacheIdstring-The internal email cache ID to identify emails in the same group mails<sample_email@trendmicro.com> +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailCcAddressesdynamicEmailRecipientMail CC address in the email header +
    +
  • <sample_email@trendmicro.com>
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailDirectionint-Email traffic direction +
    +
  • 1
  • +
  • 3
  • +
  • 25
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailDirectionint-Email traffic direction +
    +
  • 1
  • +
  • 3
  • +
  • 25
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailEurekaRuleIdsdynamic-The list of rule IDs scanned by Eureka and detected by Trend Micro Anti-Spam Engine +
    +
  • 661030
  • +
  • 661230
  • +
  • 661267
  • +
+
+
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailFeatureIddynamic-The email protocol detected by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailFolderstring-The email folder name +
    +
  • Inbox
  • +
  • Bandeja de entrada
  • +
  • Sent Items
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailFromAddressesdynamicEmailSenderMail from address in email headersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailHeaderHashstring-The email header hash detected by Trend Micro Anti-Spam Engine +
    +
  • 43f8bfc02d8f78f069c254bc17eba80b
  • +
  • aa5d16ca145f91471e482d235843aac5
  • +
  • ad8776382ea4b7cffd0961c70223162e
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailHelostring-The HELO command detected by Trend Micro Anti-Spam EngineHELO inpost.tmes.trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMetaTextstring-The postman meta text detected by Trend Micro Anti-Spam Engine +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMetaTraceIdstring-The trace ID generated by Trend Micro Feedback Engine +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgDirectionint-The direction of the email message1 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgIdstringEmailMessageIDEmail ID<sample-id@trendmicro.com> +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgSubjectstringEmailSubjectThe email subject +
    +
  • FW. mail subject
  • +
  • ManageEngine
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
mailMsgSubjectstringEmailSubjectEmail subject +
    +
  • Your daily briefing
  • +
  • Security alert for DeleteSecurityGroup on Account 549918006255 in Region: ap-southeast-1
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailReplyToAddressesdynamic-The Reply To address detected by Trend Micro Anti-Spam Enginesample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailReturnPathdynamic-The hidden email header that indicates where bounced messages are sentsample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailRuleIddynamic-The rule ID of the matched rule detected by Trend Micro Anti-Spam Engine +
    +
  • 42003
  • +
  • 148036
  • +
  • 148140
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailScorestring-The score assigned to the email by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailSenderIpstring-Email sender IP address10.10.10.10 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSmtpFromAddressesdynamic-The sender email addresssample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSmtpOriginalRecipientsdynamic-Original email recipients in the SMTP envelopesample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSmtpRecipientsdynamic-Email recipients in the SMTP envelope after scanningsample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSmtpTlsstring-The SMTP TLS version number +
    +
  • TLS 1.2
  • +
  • TLS 1.3
  • +
  • noTLS
  • +
+
+
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSourceDomainstring-Email domain of the senderexample.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailTagHashstring-The email tag hash detected by Trend Micro Anti-Spam Engine +
    +
  • 9ce01ebc63f408264876646e20905349
  • +
  • cf679dc99042b781106cbaccd4045ed3
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailTagHashRawSignaturestring-The raw signature hash of the email +
    +
  • PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjxtZXRhIG5hbWU9IGNvbnRlbnQ9ID48c3R5bGU+PCEtLS0tPjwvc3R5bGU+PC9oZWFkPjxib2R5IGxhbmc9IGxpbms9IHZsaW5rPSBzdHlsZT0gPjxkaXYgY2xhc3M9ID48cCBjbGFzcz0gPjxURVhUPjwvcD48L2Rpdj48L2JvZHk+PC9odG1sPg==
  • +
  • PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjwvaGVhZD48Ym9keT48VEVYVD48L2JvZHk+PC9odG1sPg==
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailTextHashstring-The email text hash detected by Trend Micro Anti-Spam Engine +
    +
  • 221bab3766f6d2a2c6fcc37056511d53
  • +
  • f26f3a415103ea083ac49be6bb60f337
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailThreatTypestring-The type of email detected by Trend Micro Anti-Spam Engine +
    +
  • suspected
  • +
  • suspected,
  • +
  • suspected, phishing
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailToAddressesdynamicEmailRecipientMail To address in the email headersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlHashstring-The email URL hash detected by Trend Micro Anti-Spam Engine +
    +
  • ca52197d96e4a00ce19eaf34b20c8937
  • +
  • ad50776a891bead6bf222e2b7be17724
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsOriginalLinkdynamic-The original URL extracted from the email content +
    +
  • https://aka.ms/JoinTeamsMeeting
  • +
  • http://go.microsoft.com/fwlink/p/?LinkID=12345
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsRealLinkdynamicURLURL extracted from the email content +
    +
  • https://aka.ms/JoinTeamsMeeting
  • +
  • http://go.microsoft.com/fwlink/p/?LinkID=12345
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsVisibleLinkdynamicURLURL extracted from the email content +
    +
  • Unsubscribe
  • +
  • Android
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUserAgentstring-The user agent +
    +
  • Mutt/1.4.2.2i
  • +
  • Heirloom mailx 12.5 7/5/10
  • +
+
+
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailWantedHeaderNamedynamic-The WantedHeader key name detected by Trend Micro Anti-Spam Engine +
    +
  • CC
  • +
  • X-TM-Product-Ver
  • +
  • Received
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailWantedHeaderValuedynamic-The WantedHeader key value detected by Trend Micro Anti-Spam Engine +
    +
  • cloud-app-security-5.0
  • +
  • BCL:0;
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailWholeHeaderdynamic-The name and email address of the sender in the From header detected by Trend Micro Anti-Spam Engine<sample_email@trendmicro.com> +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailXMailerstring-The X-Mailer header of the email +
    +
  • Microsoft Outlook 16.0
  • +
  • Microsoft CDO for Windows 2000
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
mExternalUidstring-The unique ID of the email11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
msgIdstringEmailMessageIDThe internet message ID +
    +
  • 66.6.00.0006
  • +
  • example.test.com
  • +
  • dameware1svr
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
msgUuidstring-The unique email ID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
msgUuidstring-Internal email UUID to identify each email message11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
msgUuidChainstring-The internal UUID chain for each email in Trend Micro Feedback Engine11111111-1111-1111-1111-111111111111;00000000-0000-0000-0000-000000000000 +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
orgIdstring-The organization ID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
orgIdstring-The organization ID11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-Internal product code (depricated) +
    +
  • 733
  • +
  • 742
  • +
  • TMEMS
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleVerstring-The rule version +
    +
  • 202207060001
  • +
  • 202207190001
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
scanTsstring-The time the email was scanned1657135700000 +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
  • Trend Micro Email Security
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
scanTypestring-Manual or real-time scan +
    +
  • realtime_mailmeta-exchange
  • +
  • realtime_mailmeta-gmail
  • +
  • gateway_mailmetadata
  • +
  • gateway_realtime_accepted_mail_traffic
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
subRuleNamestring-The subrule name +
    +
  • Pre-authentication failed.
  • +
  • ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System Logs,File Deletion
  • +
  • ATTACK T1110: Multiple Windows Logon Failures
  • +
  • invisible_url_domain
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
suserdynamicEmailSenderThe email sendersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 93 +- **Layer:** Email +- **Product:** Email Sensor + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Email/Trend Micro Cloud App Security.md b/pages/Email/Trend Micro Cloud App Security.md new file mode 100644 index 0000000..7d74d0f --- /dev/null +++ b/pages/Email/Trend Micro Cloud App Security.md @@ -0,0 +1,2501 @@ +--- +layout: default +title: Trend Micro Cloud App Security - Email +--- + +# Trend Micro Cloud App Security +**Layer:** Email + +This documentation provides detailed information about all fields available for Trend Micro Cloud App Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
actResultdynamic-The result of an action +
    +
  • Dropped
  • +
  • Successful
  • +
  • Accepted
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • Mobile Security
  • +
+
attachmentdynamic-The information about the email attachment{"attachmentFileTlsh": "", "attachmentFileName": "testfile.txt","attachmentFileHash": "","attachmentFileSize": "-1"} +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashesdynamic-The SHA-1 of the email attachment +
    +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
  • 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashesdynamicFileSHA1SHA-1 hash of the email attachment +
    +
  • acedb7898338a46f38d148d1d0456e644576d41b
  • +
  • ea6fcc4c0c1f10d71742b29e98a977d995473dd1
  • +
  • 03d8fb85556edf397d8afcafc0b13f11ecbde50c
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashMd5stringFileMD5The MD5 of the attached file (attachementFileName) +
    +
  • RSjbNuJB0hx39ZpzwLdipg==
  • +
  • +TmuTNLw3FMQlaTbPwjD8g==
  • +
  • +XWktHxXXdY0O4A82FQMzQ==
  • +
+
Trend Micro Cloud App Security
attachmentFileHashsdynamic-The SHA-1 hash value of the attachment file +
    +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
  • 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashSha1stringFileSHA1The SHA-1 of the attached file (attachementFileName) +
    +
  • d63b1739a2fe56eb412dff1c69b76d4b9aad8ebd
  • +
  • 3b923d078ea3bd39489ed6d334c423e4478a8ee3
  • +
  • 3a2e6a64e1b7f4c6cbebcb9e949dc66b667cdfbe
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
attachmentFileHashSha256sdynamicFileSHA2SHA-256 hash of the email attachment +
    +
  • 0570dfd156ee00cb7bc2a94998157cb3a29292b9e9feed82d4b6c7d2c6bdd9d4
  • +
  • 2d96ebbbc5a5687b0f18fd5620e4e5489d49a877430146bbca447fabe9c47a6e
  • +
  • 20d27422610967122439735cbcb48e4382a16e94a8b29c068e6b7d0e40466427
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileNamedynamicFileNameThe file name of an attachment +
    +
  • Mail Body
  • +
  • image001.png
  • +
  • image002.png
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileNamedynamicFileNameFile name of the email attachment +
    +
  • image001.png
  • +
  • image002.png
  • +
  • image003.png
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileTlshesdynamic-The TLSH of the email attachment +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileTlshesdynamic-The TLSH hash detected by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
attachmentFileTlshsdynamic-The TLSH hash value of the attachment file +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentMd5dynamicFileMD5MD5 hash of the email attachment +
    +
  • 003fa299ab119219596f952c68029810
  • +
  • 03aeabf6a745cb627ee29c05a22e58cb
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSha1dynamicFileSHA1SHA-1 hash of the email attachment +
    +
  • 03d8fb85556edf397d8afcafc0b13f11ecbde50c
  • +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSha256dynamicFileSHA2SHA-256 hash of the email attachment +
    +
  • 29d72af5608ee5eade7c4346d3c32dfcc6b54f8fb43d977ff0306ad68b255a01
  • +
  • cb0628092ddea96bb040221b5c793dbbb792a67d0621bdfba170c07374d85801
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSizedynamic-The attachment file size- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
attachmentSourcedynamic-The attachment source +
    +
  • TMASE
  • +
  • PRODUCT
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentTlshdynamic-The TLSH hash detected by Trend Micro Anti-Spam Engine +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 7C31C9827A71A905CC6B0A73B10FE80C06F01E814AA396347F8B6F979690E9C3D75147
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
cloudAppNamestring-The cloud app name +
    +
  • teams
  • +
  • sharepoint
  • +
  • exchange
  • +
  • gmail
  • +
+
Trend Micro Cloud App Security
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
domainNamestringDomainNameThe detected domain name +
    +
  • http://10.10.10.10
  • +
  • example.domain.com
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
+
duserdynamicEmailRecipientThe email recipient +
    +
  • (no user)
  • +
  • SYSTEM
  • +
  • SYSTEM
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
engVerstring-The engine version +
    +
  • 1.0.0.1123_1.0.0.1101
  • +
  • 9.0.1004
  • +
  • 22.540.1001
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdint-The event ID +
    +
  • 1 - MESSAGING_EMAIL_META
  • +
  • 2 - MESSAGING_COLLABORATION_ACTIVITY
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
  • Collaboration sensor
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubNamestring-The event type sub-name +
    +
  • IPS Detection
  • +
  • Personal Firewall
  • +
  • Attack Discovery
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
eventTimereal-The time the agent detected the event1657135700000 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
filterNamestring-The filter name +
    +
  • ConnectionFilter
  • +
  • Virtual Analyzer
  • +
  • Data Loss Prevention
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
+
firstSeenstring-The first time the XDR log appeared1657195233000 +
    +
  • Trend Micro Cloud App Security
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
+
groupIdstring-The group ID for the management scope filter11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
highlightedFileHashesdynamicFileSHA1The SHA-1 hashes of the highlighted file +
    +
  • C9877617DB6715792F9D5C959C1E8D4E56D0C281
  • +
  • 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722
  • +
  • 0E56D9540B07ED15EF745348D35C72A6A00A0BD9
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
highlightedFileNamedynamic-The file names of suspicious attachments +
    +
  • detect_me.zip
  • +
  • covid.zip
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
indicatorCountint-The number of report indicators2Trend Micro Cloud App Security
lastSeenstring-The last time the XDR log appeared1657195233000 +
    +
  • Trend Micro Cloud App Security
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
mailAttachmentHashstringFileMD5Hash value of the email attachment +
    +
  • 02ab50ee0bccadb43d6cc504928f2ff2
  • +
  • 0a0f335fb04f1acebb7500d5358321c0
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailBccAddressesdynamicEmailRecipientMail BCC address in the email headersample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailboxstring-The mailbox that is protected by Trend Microsample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Mobile Security
  • +
  • Email Sensor
  • +
+
mailboxstring-Primary email addresssample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailCacheIdstring-The internal email cache ID to identify emails in the same group mails<sample_email@trendmicro.com> +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailCcAddressesdynamicEmailRecipientMail CC address in the email header +
    +
  • <sample_email@trendmicro.com>
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailDirectionint-Email traffic direction +
    +
  • 1
  • +
  • 3
  • +
  • 25
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailDirectionint-Email traffic direction +
    +
  • 1
  • +
  • 3
  • +
  • 25
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailEurekaRuleIdsdynamic-The list of rule IDs scanned by Eureka and detected by Trend Micro Anti-Spam Engine +
    +
  • 661030
  • +
  • 661230
  • +
  • 661267
  • +
+
+
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailFeatureIddynamic-The email protocol detected by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailFolderstring-The email folder name +
    +
  • CATEGORY_PROMOTIONS, UNREAD, INBOX
  • +
  • UNREAD, CATEGORY_PERSONAL, INBOX
  • +
  • UNREAD, CATEGORY_UPDATES, INBOX
  • +
+
Trend Micro Cloud App Security
mailFolderstring-The email folder name +
    +
  • Inbox
  • +
  • Bandeja de entrada
  • +
  • Sent Items
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailFromAddressesdynamicEmailSenderMail from address in email headersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailHeaderHashstring-The email header hash detected by Trend Micro Anti-Spam Engine +
    +
  • 43f8bfc02d8f78f069c254bc17eba80b
  • +
  • aa5d16ca145f91471e482d235843aac5
  • +
  • ad8776382ea4b7cffd0961c70223162e
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailHelostring-The HELO command detected by Trend Micro Anti-Spam EngineHELO inpost.tmes.trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgDirectionint-The direction of the email message1 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgIdstring-The internet message ID of the email<sample_email@trendmicro.com>Trend Micro Cloud App Security
mailMsgIdstringEmailMessageIDEmail ID<sample-id@trendmicro.com> +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgSubjectstringEmailSubjectThe email subject +
    +
  • FW. mail subject
  • +
  • ManageEngine
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
mailMsgSubjectstringEmailSubjectEmail subject +
    +
  • Your daily briefing
  • +
  • Security alert for DeleteSecurityGroup on Account 549918006255 in Region: ap-southeast-1
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailReceivedTimestring-The mail received timestamp- +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
mailReplyToAddressesdynamic-The Reply To address detected by Trend Micro Anti-Spam Enginesample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailReturnPathdynamic-The hidden email header that indicates where bounced messages are sentsample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailRuleIddynamic-The rule ID of the matched rule detected by Trend Micro Anti-Spam Engine +
    +
  • 42003
  • +
  • 148036
  • +
  • 148140
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailScorestring-The score assigned to the email by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailSenderIpstring-Email sender IP address10.10.10.10 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSourceDomainstring-Email domain of the senderexample.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailTagHashstring-The email tag hash detected by Trend Micro Anti-Spam Engine +
    +
  • 9ce01ebc63f408264876646e20905349
  • +
  • cf679dc99042b781106cbaccd4045ed3
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailTagHashRawSignaturestring-The raw signature hash of the email +
    +
  • PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjxtZXRhIG5hbWU9IGNvbnRlbnQ9ID48c3R5bGU+PCEtLS0tPjwvc3R5bGU+PC9oZWFkPjxib2R5IGxhbmc9IGxpbms9IHZsaW5rPSBzdHlsZT0gPjxkaXYgY2xhc3M9ID48cCBjbGFzcz0gPjxURVhUPjwvcD48L2Rpdj48L2JvZHk+PC9odG1sPg==
  • +
  • PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjwvaGVhZD48Ym9keT48VEVYVD48L2JvZHk+PC9odG1sPg==
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailTextHashstring-The email text hash detected by Trend Micro Anti-Spam Engine +
    +
  • 221bab3766f6d2a2c6fcc37056511d53
  • +
  • f26f3a415103ea083ac49be6bb60f337
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailThreatTypestring-The type of email detected by Trend Micro Anti-Spam Engine +
    +
  • suspected
  • +
  • suspected,
  • +
  • suspected, phishing
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailToAddressesdynamicEmailRecipientMail To address in the email headersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUniqueIdstring-The unique ID of the email +
    +
  • example_unique_id_1
  • +
  • example_unique_id_2
  • +
  • example_unique_id_3
  • +
+
Trend Micro Cloud App Security
mailUrlHashstring-The email URL hash detected by Trend Micro Anti-Spam Engine +
    +
  • ca52197d96e4a00ce19eaf34b20c8937
  • +
  • ad50776a891bead6bf222e2b7be17724
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsOriginalLinkdynamic-The original URL extracted from the email content +
    +
  • https://aka.ms/JoinTeamsMeeting
  • +
  • http://go.microsoft.com/fwlink/p/?LinkID=12345
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsRealLinkdynamicURLURL extracted from the email content +
    +
  • https://aka.ms/JoinTeamsMeeting
  • +
  • http://go.microsoft.com/fwlink/p/?LinkID=12345
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsVisibleLinkdynamicURLURL extracted from the email content +
    +
  • Unsubscribe
  • +
  • Android
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUserAgentstring-The user agent +
    +
  • Mutt/1.4.2.2i
  • +
  • Heirloom mailx 12.5 7/5/10
  • +
+
+
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailWantedHeaderNamedynamic-The WantedHeader key name detected by Trend Micro Anti-Spam Engine +
    +
  • CC
  • +
  • X-TM-Product-Ver
  • +
  • Received
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailWantedHeaderValuedynamic-The WantedHeader key value detected by Trend Micro Anti-Spam Engine +
    +
  • cloud-app-security-5.0
  • +
  • BCL:0;
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailWholeHeaderdynamic-The name and email address of the sender in the From header detected by Trend Micro Anti-Spam Engine<sample_email@trendmicro.com> +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailXMailerstring-The X-Mailer header of the email +
    +
  • Microsoft Outlook 16.0
  • +
  • Microsoft CDO for Windows 2000
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mExternalUidstring-The unique ID of the email11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
msgIdstringEmailMessageIDThe internet message ID +
    +
  • 66.6.00.0006
  • +
  • example.test.com
  • +
  • dameware1svr
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
msgTOCUuidstring-The email unique ID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
msgUuidstring-The unique email ID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
msgUuidstring-Internal email UUID to identify each email message11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
objectSubTypestring-The sub-types of the policy event (Displayed when a policy event has sub-types) +
    +
  • Spam Others
  • +
  • malware
  • +
  • ContentFiltering
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
objectTypestring-The object type +
    +
  • file
  • +
  • process
  • +
  • qil
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • File Security
  • +
+
orgIdstring-The organization ID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
orgIdstring-The organization ID11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
patVerstring-The version of the behavior pattern +
    +
  • 35.1053.00
  • +
  • 630
  • +
  • 35.1071.00
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Cloud App Security
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-Internal product code (depricated) +
    +
  • 733
  • +
  • 742
  • +
  • TMEMS
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
policyNamestring-The name of the triggered policy +
    +
  • Steelcase
  • +
  • Cabot
  • +
  • Tigre - Medium Policy
  • +
  • apiPostedPolicy
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
policyTemplatedynamic-The one-to-many data structure +
    +
  • policyName:Monitoreo All Files, template:Managed - All files
  • +
  • policyName:HSS DLP, template:All File Extension
  • +
  • India: Mobile Numbers
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
principalNamestring-The user principal name used to sign in to the proxysample_email@trendmicro.com +
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
reportGUIDstring-The GUID for Workbench to request report page data +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • File Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
respCodestring-The network protocol response code +
    +
  • 302
  • +
  • 200
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
rewrittenUrlstring-The rewritten URLhttps://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fexample.io%2 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
riskConfidenceLevelstring-The risk confidence level +
    +
  • 0
  • +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
+
riskLevelstring-The risk level +
    +
  • 1
  • +
  • high
  • +
  • No Risk
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleTypestring-The access rule type +
    +
  • udso
  • +
  • point of entry
  • +
  • unknown
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
ruleUuidstring-The signature UUID from the DV (Digital Vaccine) +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 00000001-0001-0001-0001-000000007120
  • +
  • 00000001-0001-0001-0001-000000017056
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
ruleVerstring-The rule version +
    +
  • 202207060001
  • +
  • 202207190001
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
scanTsstring-The mail scan time- +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
scanTsstring-The time the email was scanned1657135700000 +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
  • Trend Micro Email Security
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
scanTypestring-Manual or real-time scan +
    +
  • realtime_mailmeta-exchange
  • +
  • realtime_mailmeta-gmail
  • +
  • gateway_mailmetadata
  • +
  • gateway_realtime_accepted_mail_traffic
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
schemaVersionstring-The schema version1.0Trend Micro Cloud App Security
scoreint-The Web Reputation Services URL rating +
    +
  • 71
  • +
  • 81
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
signInCountriesdynamic-The countries from which a user signed in +
    +
  • PH
  • +
  • AU
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Microsoft Entra ID
  • +
+
subRuleNamestring-The subrule name +
    +
  • Pre-authentication failed.
  • +
  • ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System Logs,File Deletion
  • +
  • ATTACK T1110: Multiple Windows Logon Failures
  • +
  • invisible_url_domain
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
suserdynamicEmailSenderThe email sendersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
threatNamestring-The threat name +
    +
  • Malicious_CnC_access_on_UDP_blocked
  • +
  • Malicious_CnC_access_on_TCP_blocked
  • +
  • Other protected file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
urlCatdynamic-The requested URL category +
    +
  • Untested
  • +
  • 158
  • +
  • Web Advertisement
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 119 +- **Layer:** Email +- **Product:** Trend Micro Cloud App Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Email/Trend Micro Email Security.md b/pages/Email/Trend Micro Email Security.md new file mode 100644 index 0000000..b1427c3 --- /dev/null +++ b/pages/Email/Trend Micro Email Security.md @@ -0,0 +1,2155 @@ +--- +layout: default +title: Trend Micro Email Security - Email +--- + +# Trend Micro Email Security +**Layer:** Email + +This documentation provides detailed information about all fields available for Trend Micro Email Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
attachmentFileHashesdynamic-The SHA-1 of the email attachment +
    +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
  • 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashesdynamicFileSHA1SHA-1 hash of the email attachment +
    +
  • acedb7898338a46f38d148d1d0456e644576d41b
  • +
  • ea6fcc4c0c1f10d71742b29e98a977d995473dd1
  • +
  • 03d8fb85556edf397d8afcafc0b13f11ecbde50c
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashsdynamic-The SHA-1 hash value of the attachment file +
    +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
  • 05fd3ac8f9d8407e6637e0f91cd2ff5ab076658a
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileHashSha1stringFileSHA1The SHA-1 of the attached file (attachementFileName) +
    +
  • d63b1739a2fe56eb412dff1c69b76d4b9aad8ebd
  • +
  • 3b923d078ea3bd39489ed6d334c423e4478a8ee3
  • +
  • 3a2e6a64e1b7f4c6cbebcb9e949dc66b667cdfbe
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
attachmentFileHashSha256stringFileSHA2The SHA-256 of the attached file (attachementFileName) +
    +
  • D81D4C14DDEB8CA390FFADA69265AAD46CDEDD72CDD332CB8AA17D924626B397
  • +
  • 01DE1FC697D2D0850F0468474A3E1E0BF4D78B23F0633908CF82E504E0DCBFF9
  • +
  • 02D16D9970AB635A7B05C3A268E23F5B41C419DD022F1054E9FD912BE130BDB0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
+
attachmentFileHashSha256sdynamicFileSHA2SHA-256 hash of the email attachment +
    +
  • 0570dfd156ee00cb7bc2a94998157cb3a29292b9e9feed82d4b6c7d2c6bdd9d4
  • +
  • 2d96ebbbc5a5687b0f18fd5620e4e5489d49a877430146bbca447fabe9c47a6e
  • +
  • 20d27422610967122439735cbcb48e4382a16e94a8b29c068e6b7d0e40466427
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileNamedynamicFileNameThe file name of an attachment +
    +
  • Mail Body
  • +
  • image001.png
  • +
  • image002.png
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileNamedynamicFileNameFile name of the email attachment +
    +
  • image001.png
  • +
  • image002.png
  • +
  • image003.png
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileTlshesdynamic-The TLSH of the email attachment +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentFileTlshesdynamic-The TLSH hash detected by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
attachmentFileTlshsdynamic-The TLSH hash value of the attachment file +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 97D18E86E87A85D1D4137E6DA6FD00580E4CF06F65DB2B2937815E4F3A3013042A2189
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentMd5dynamicFileMD5MD5 hash of the email attachment +
    +
  • 003fa299ab119219596f952c68029810
  • +
  • 03aeabf6a745cb627ee29c05a22e58cb
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSha1dynamicFileSHA1SHA-1 hash of the email attachment +
    +
  • 03d8fb85556edf397d8afcafc0b13f11ecbde50c
  • +
  • 056a2975edffe7188c03c324ae4335f9380b57e3
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSha256dynamicFileSHA2SHA-256 hash of the email attachment +
    +
  • 29d72af5608ee5eade7c4346d3c32dfcc6b54f8fb43d977ff0306ad68b255a01
  • +
  • cb0628092ddea96bb040221b5c793dbbb792a67d0621bdfba170c07374d85801
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentSizedynamic-The attachment file size- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
attachmentSourcedynamic-The attachment source +
    +
  • TMASE
  • +
  • PRODUCT
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentTlshdynamic-The TLSH hash detected by Trend Micro Anti-Spam Engine +
    +
  • 0FE18E0807B75799EF3ADD7A98D62411FEB31DAB419C913C058068A3A6B33BD114EA39
  • +
  • 7C31C9827A71A905CC6B0A73B10FE80C06F01E814AA396347F8B6F979690E9C3D75147
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
attachmentUrlsdynamic-The URLs and URL sources extracted from the email attachment- +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
correlatedIntelligencedynamic-The Correlated Intelligence detection{"risk_type": "Anomaly","matched_rules": [{"threat_type": "Possibly Unwanted Email","matched_filters": [{"id":"FIL013", "name": "Marketing Email Traits"},{"id":"FIL098", "name": "Infrequent Sender Email Domain"}],"name": "Possibly Unwanted Marketing Email","id": "AN004"}]} +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
detectionDetailstring-The details about each event type +
    +
  • {}
  • +
  • {"detail":"4.7.1 \u003csample_email@trendmicro.com\u003e: Recipient address rejected: Ratelimit-2"}
  • +
  • {"detail":"4.7.1 \u003csample_email@trendmicro.com.br\u003e: Recipient address rejected: Ratelimit-2"}
  • +
+
Trend Micro Email Security
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
duserdynamicEmailRecipientThe email recipient +
    +
  • (no user)
  • +
  • SYSTEM
  • +
  • SYSTEM
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdint-The event ID +
    +
  • 1 - MESSAGING_EMAIL_META
  • +
  • 2 - MESSAGING_COLLABORATION_ACTIVITY
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
  • Collaboration sensor
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubNamestring-The event type sub-name +
    +
  • IPS Detection
  • +
  • Personal Firewall
  • +
  • Attack Discovery
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
eventTimereal-The time the agent detected the event1657135700000 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
filterNamestring-The filter name +
    +
  • ConnectionFilter
  • +
  • Virtual Analyzer
  • +
  • Data Loss Prevention
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
+
groupIdstring-The group ID for the management scope filter11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
highlightedFileHashesdynamicFileSHA1The SHA-1 hashes of the highlighted file +
    +
  • C9877617DB6715792F9D5C959C1E8D4E56D0C281
  • +
  • 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722
  • +
  • 0E56D9540B07ED15EF745348D35C72A6A00A0BD9
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
highlightMailMsgSubjectstring-The email subject +
    +
  • Delivery Status
  • +
  • Undelivered Mail Returned to Sender
  • +
  • Successful Mail Delivery Report
  • +
+
Trend Micro Email Security
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
mailAttachmentHashstringFileMD5Hash value of the email attachment +
    +
  • 02ab50ee0bccadb43d6cc504928f2ff2
  • +
  • 0a0f335fb04f1acebb7500d5358321c0
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailBccAddressesdynamicEmailRecipientMail BCC address in the email headersample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailboxstring-The mailbox that is protected by Trend Microsample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Mobile Security
  • +
  • Email Sensor
  • +
+
mailCcAddressesdynamicEmailRecipientMail CC address in the email header +
    +
  • <sample_email@trendmicro.com>
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailDirectionint-Email traffic direction +
    +
  • 1
  • +
  • 3
  • +
  • 25
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailDirectionint-Email traffic direction +
    +
  • 1
  • +
  • 3
  • +
  • 25
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailEurekaRuleIdsdynamic-The list of rule IDs scanned by Eureka and detected by Trend Micro Anti-Spam Engine +
    +
  • 661030
  • +
  • 661230
  • +
  • 661267
  • +
+
+
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailFeatureIddynamic-The email protocol detected by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailFromAddressesdynamicEmailSenderMail from address in email headersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailHeaderHashstring-The email header hash detected by Trend Micro Anti-Spam Engine +
    +
  • 43f8bfc02d8f78f069c254bc17eba80b
  • +
  • aa5d16ca145f91471e482d235843aac5
  • +
  • ad8776382ea4b7cffd0961c70223162e
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailHelostring-The HELO command detected by Trend Micro Anti-Spam EngineHELO inpost.tmes.trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMetaTextstring-The postman meta text detected by Trend Micro Anti-Spam Engine +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMetaTraceIdstring-The trace ID generated by Trend Micro Feedback Engine +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgDirectionint-The direction of the email message1 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgIdstringEmailMessageIDEmail ID<sample-id@trendmicro.com> +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailMsgSubjectstringEmailSubjectThe email subject +
    +
  • FW. mail subject
  • +
  • ManageEngine
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
mailMsgSubjectstringEmailSubjectEmail subject +
    +
  • Your daily briefing
  • +
  • Security alert for DeleteSecurityGroup on Account 549918006255 in Region: ap-southeast-1
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailReceivedTimestring-The mail received timestamp- +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
mailReplyToAddressesdynamic-The Reply To address detected by Trend Micro Anti-Spam Enginesample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailRuleIddynamic-The rule ID of the matched rule detected by Trend Micro Anti-Spam Engine +
    +
  • 42003
  • +
  • 148036
  • +
  • 148140
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailScorestring-The score assigned to the email by Trend Micro Anti-Spam Engine- +
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailSenderIpstring-Email sender IP address10.10.10.10 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSmtpFromAddressesdynamic-The envelope address of the sendersample_email@trendmicro.comTrend Micro Email Security
mailSmtpFromAddressesdynamic-The sender email addresssample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSmtpHelostring-The domain name of the email server by using the SMTP HELO commandexample.comTrend Micro Email Security
mailSmtpOriginalRecipientsdynamic-The envelope addresses of the original recipientssample_email@trendmicro.comTrend Micro Email Security
mailSmtpOriginalRecipientsdynamic-Original email recipients in the SMTP envelopesample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSmtpRecipientsdynamic-The envelope addresses of the current recipientssample_email@trendmicro.comTrend Micro Email Security
mailSmtpRecipientsdynamic-Email recipients in the SMTP envelope after scanningsample_email@trendmicro.com +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailSmtpTlsstring-The SMTP TLS version, for example, TLS 1.2 +
    +
  • noTLS
  • +
  • TLS 1.2
  • +
  • TLS 1.3
  • +
+
Trend Micro Email Security
mailSmtpTlsstring-The SMTP TLS version number +
    +
  • TLS 1.2
  • +
  • TLS 1.3
  • +
  • noTLS
  • +
+
+
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailTagHashstring-The email tag hash detected by Trend Micro Anti-Spam Engine +
    +
  • 9ce01ebc63f408264876646e20905349
  • +
  • cf679dc99042b781106cbaccd4045ed3
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailTagHashRawSignaturestring-The raw signature hash of the email +
    +
  • PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjxtZXRhIG5hbWU9IGNvbnRlbnQ9ID48c3R5bGU+PCEtLS0tPjwvc3R5bGU+PC9oZWFkPjxib2R5IGxhbmc9IGxpbms9IHZsaW5rPSBzdHlsZT0gPjxkaXYgY2xhc3M9ID48cCBjbGFzcz0gPjxURVhUPjwvcD48L2Rpdj48L2JvZHk+PC9odG1sPg==
  • +
  • PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0gY29udGVudD0gY2hhcnNldD0gPjwvaGVhZD48Ym9keT48VEVYVD48L2JvZHk+PC9odG1sPg==
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailTextHashstring-The email text hash detected by Trend Micro Anti-Spam Engine +
    +
  • 221bab3766f6d2a2c6fcc37056511d53
  • +
  • f26f3a415103ea083ac49be6bb60f337
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailThreatTypestring-The type of email detected by Trend Micro Anti-Spam Engine +
    +
  • suspected
  • +
  • suspected,
  • +
  • suspected, phishing
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailToAddressesdynamicEmailRecipientMail To address in the email headersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlHashstring-The email URL hash detected by Trend Micro Anti-Spam Engine +
    +
  • ca52197d96e4a00ce19eaf34b20c8937
  • +
  • ad50776a891bead6bf222e2b7be17724
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsOriginalLinkdynamic-The original URL extracted from the email content +
    +
  • https://aka.ms/JoinTeamsMeeting
  • +
  • http://go.microsoft.com/fwlink/p/?LinkID=12345
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsRealLinkdynamicURLURL extracted from the email content +
    +
  • https://aka.ms/JoinTeamsMeeting
  • +
  • http://go.microsoft.com/fwlink/p/?LinkID=12345
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUrlsVisibleLinkdynamicURLURL extracted from the email content +
    +
  • Unsubscribe
  • +
  • Android
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailUserAgentstring-The user agent +
    +
  • Mutt/1.4.2.2i
  • +
  • Heirloom mailx 12.5 7/5/10
  • +
+
+
    +
  • Trend Micro Email Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
+
mailWantedHeaderNamedynamic-The WantedHeader key name detected by Trend Micro Anti-Spam Engine +
    +
  • CC
  • +
  • X-TM-Product-Ver
  • +
  • Received
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailWantedHeaderValuedynamic-The WantedHeader key value detected by Trend Micro Anti-Spam Engine +
    +
  • cloud-app-security-5.0
  • +
  • BCL:0;
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailWholeHeaderdynamic-The name and email address of the sender in the From header detected by Trend Micro Anti-Spam Engine<sample_email@trendmicro.com> +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
mailXMailerstring-The X-Mailer header of the email +
    +
  • Microsoft Outlook 16.0
  • +
  • Microsoft CDO for Windows 2000
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
msgIdstringEmailMessageIDThe internet message ID +
    +
  • 66.6.00.0006
  • +
  • example.test.com
  • +
  • dameware1svr
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
msgTOCUuidstring-The email unique ID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
msgUuidstring-The unique email ID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
msgUuidstring-Internal email UUID to identify each email message11111111-1111-1111-1111-111111111111 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
msgUuidChainstring-The message UUID chain +
    +
  • 00027ac3-f8f2-cc8f-d078-3a57f12f3d55;00027ac3-f8f2-cc8f-d078-3a57f12f3d55
  • +
  • 0005ab64-3992-644c-3592-503c3610cec9;0005ab64-3992-644c-3592-503c3610cec9
  • +
  • 00062621-fec4-9e4d-7609-25b2b3189214;00062621-fec4-9e4d-7609-25b2b3189214
  • +
+
Trend Micro Email Security
msgUuidChainstring-The internal UUID chain for each email in Trend Micro Feedback Engine11111111-1111-1111-1111-111111111111;00000000-0000-0000-0000-000000000000 +
    +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
objectSubTypestring-The sub-types of the policy event (Displayed when a policy event has sub-types) +
    +
  • Spam Others
  • +
  • malware
  • +
  • ContentFiltering
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
objectTypestring-The object type +
    +
  • file
  • +
  • process
  • +
  • qil
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • File Security
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-Internal product code (depricated) +
    +
  • 733
  • +
  • 742
  • +
  • TMEMS
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
policyNamestring-The name of the triggered policy +
    +
  • Steelcase
  • +
  • Cabot
  • +
  • Tigre - Medium Policy
  • +
  • apiPostedPolicy
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
respCodestring-The network protocol response code +
    +
  • 302
  • +
  • 200
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
rewrittenUrlstring-The rewritten URLhttps://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fexample.io%2 +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleVerstring-The rule version +
    +
  • 202207060001
  • +
  • 202207190001
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
scanTsstring-The mail scan time- +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
scanTsstring-The time the email was scanned1657135700000 +
    +
  • Trend Micro Cloud App Security
  • +
  • Email Sensor
  • +
  • Trend Micro Email Security
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
scanTypestring-Manual or real-time scan +
    +
  • realtime_mailmeta-exchange
  • +
  • realtime_mailmeta-gmail
  • +
  • gateway_mailmetadata
  • +
  • gateway_realtime_accepted_mail_traffic
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
senderIpdynamic-The sender IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
+
subRuleNamestring-The subrule name +
    +
  • Pre-authentication failed.
  • +
  • ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System Logs,File Deletion
  • +
  • ATTACK T1110: Multiple Windows Logon Failures
  • +
  • invisible_url_domain
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
suserdynamicEmailSenderThe email sendersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 103 +- **Layer:** Email +- **Product:** Trend Micro Email Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Endpoint/Data Detection and Response.md b/pages/Endpoint/Data Detection and Response.md new file mode 100644 index 0000000..b6a2ea3 --- /dev/null +++ b/pages/Endpoint/Data Detection and Response.md @@ -0,0 +1,852 @@ +--- +layout: default +title: Data Detection and Response - Endpoint +--- + +# Data Detection and Response +**Layer:** Endpoint + +This documentation provides detailed information about all fields available for Data Detection and Response. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
aggregateFunctionint-The metric aggregator +
    +
  • 0 - sum
  • +
  • 1 - avg
  • +
+
Data Detection and Response
aggregateUnitstring-The metric unitfileData Detection and Response
detectionFileListdynamic-The information about the related files{"fileName": "sample.txt", "edgeId": "00000000-0000-0000-0000-000000000000"}Data Detection and Response
dptintPortThe destination port number- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
dststring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
durationstring-The detection interval (in milliseconds)300000Data Detection and Response
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the endpoint on which the event was detected10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
firstSeenstring-The first time the XDR log appeared1657195233000 +
    +
  • Trend Micro Cloud App Security
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
+
lastSeenstring-The last time the XDR log appeared1657195233000 +
    +
  • Trend Micro Cloud App Security
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
+
lineageIdstring-The lineage ID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
Data Detection and Response
logonUsersdynamic-The telemetry events that match the Security Analytics Engine filter, and logonUsers stores the logonUsers value of the original eventsBHBShortJ +
    +
  • ALL
  • +
  • Data Detection and Response
  • +
+
matchedPoliciesdynamic-The matched policies of detection records['00000000-0000-0000-0000-000000000000']Data Detection and Response
metaSrcExtrastring-The meta for identifying the source of events[{'metaSrcUri': ...]Data Detection and Response
objectFileHashstring-The cryptographic hash of the target process image or file, with the specific hash algorithm to be determined1ca71017d2fa4775253670e1e55e26912bfdc156Data Detection and Response
objectFileSizestring-The file size of the object file +
    +
  • 59456
  • +
  • 60
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Data Detection and Response
  • +
+
objectServiceTypestring-Type of target file +
    +
  • local
  • +
  • smb
  • +
  • web
  • +
+
Data Detection and Response
objectUristring-Path of target fileC://path/of/file.txtData Detection and Response
objectUserstringUserAccountThe owner name of the target process or the login user name +
    +
  • root
  • +
  • SYSTEM
  • +
  • oracle
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
osNamestring-The host OS name +
    +
  • Linux
  • +
  • windows 10.0.22000
  • +
  • windows 10.0.19044
  • +
  • windows 10.0.19043
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Data Detection and Response
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
osVerstring-The OS version11 +
    +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Data Detection and Response
  • +
+
policyIdsstring-The Ids of DDR’s data policy11111111-1111-1111-1111-111111111111Data Detection and Response
ruleIdStrstring-The rule ID0000000-0000-0000-0000-000000000000Data Detection and Response
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
sptintPortThe source port number +
    +
  • 53
  • +
  • 5353
  • +
  • 443
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
srcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
srcFileHashstring-The cryptographic hash of the source process image or file, with the specific hash algorithm to be determined.1ca71017d2fa4775253670e1e55e26912bfdc156Data Detection and Response
srcFileSizestring-The file size of the source file +
    +
  • 0
  • +
  • 131072
  • +
  • 196608
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Data Detection and Response
  • +
+
srcServiceTypestring-Type of source file +
    +
  • local
  • +
  • smb
  • +
  • web
  • +
+
Data Detection and Response
srcUristring-Path of source fileC://path/of/file.txtData Detection and Response
srcUserstring-The owner name of the source process or the login user name +
    +
  • root
  • +
  • SYSTEM
  • +
  • oracle
  • +
+
Data Detection and Response
uuidsdynamic-The UUIDs of detection records['00000000-0000-0000-0000-000000000000']Data Detection and Response
+
+ +## Field Statistics +- **Total Fields:** 37 +- **Layer:** Endpoint +- **Product:** Data Detection and Response + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Endpoint/Endpoint Sensor.md b/pages/Endpoint/Endpoint Sensor.md new file mode 100644 index 0000000..960631d --- /dev/null +++ b/pages/Endpoint/Endpoint Sensor.md @@ -0,0 +1,6802 @@ +--- +layout: default +title: Endpoint Sensor - Endpoint +--- + +# Endpoint Sensor +**Layer:** Endpoint + +This documentation provides detailed information about all fields available for Endpoint Sensor. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
additionalInfostring-The filter rule infoDefault +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
appstring-The layer-7 network protocol being exploited protocolSMBEndpoint Sensor
authIdstring-The authorization ID +
    +
  • 999
  • +
  • 996
  • +
  • 997
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
azIdstring-The Avaliability Zone ID of the virtual machine that made the request +
    +
  • us-east-1b
  • +
  • us-west-2a
  • +
+
Endpoint Sensor
behaviorCatstring-The matched policy category +
    +
  • Policy Enforcement
  • +
  • Grey-Detection
  • +
  • Threat-Detection
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
channelstring-The Windows event channel +
    +
  • Security
  • +
  • Microsoft-Windows-WMI-Activity/Trace
  • +
  • Microsoft-Windows-TaskScheduler/Operational
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
cloudIdentityAccountIdstring-The Cloud Identity account ID used for authorization111111111111Endpoint Sensor
cloudIdentityIdstring-The Cloud Identity ID used for authorizationarn:aws:sts::111111111111:assumed-role/eksctl-aws-test-nodegroup-ng-21d38-NodeInstanceRole-3wPxVEo4zHlK/i-01234567890abcdefEndpoint Sensor
cloudIdentityNamestring-The Cloud Identity name used for authorizationAWSsampleTokenEndpoint Sensor
cloudProviderstring-The service provider of the cloud asset +
    +
  • aws
  • +
  • azure
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
cloudServiceApiNamestring-The cloud service API +
    +
  • AssumeRole
  • +
  • GetCallerIdentity
  • +
  • ListBuckets
  • +
+
Endpoint Sensor
cloudServiceNamestring-The cloud service +
    +
  • s3.us-east-1.amazonaws.com
  • +
  • dynamodb.us-west-2.amazonaws.com
  • +
+
Endpoint Sensor
codeIntegrityOptionEnabledbool-Whether the system enforced signed kernel loading according to DSE(driver signature enforcement) +
    +
  • 1
  • +
+
Endpoint Sensor
codeIntegrityOptionTestsignbool-Whether the system bypassed DSE(driver signature enforcement) checks and permitted loading of test-signed drivers +
    +
  • 1
  • +
+
Endpoint Sensor
correlationDatadynamic-The data for correlation- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
customAssetTagsdynamic-The list of custom asset tags{"os":["linux", "windows"], "org":["bu1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
customAssetTagsdynamic-The list of custom asset tags{"os":["linux", "windows"], "org":["bu1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectedBackupFolderstring-The folder path for detected backup foldersC:\\Program Files (x86)\\Trend Micro\\artifact\\DCE +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
detectionAggregationIdstring-The correlation key for detection logs and artifacts +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
Endpoint Sensor
detectionAggressivenessLevelint-The detection aggressiveness level +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
  • 4
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
deviceGUIDstring-The GUID of the agent which reported the detection +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
deviceTypeint-The disk drive type +
    +
  • TELEMETRY_DEVICE_TYPE_UNKNOWN
  • +
  • TELEMETRY_DEVICE_TYPE_REMOVABLE
  • +
+
Endpoint Sensor
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dptintPortThe destination port number- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dststring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointGuidstringEndpointIDHost GUID of the endpoint on which the event was detected11111111-1111-1111-1111-111111111111 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe host name of the endpoint on which the event was detected +
    +
  • PHILIPSIBE09
  • +
  • WHAM6WK8XG2
  • +
  • MacBook-Pro-del-Meno
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address of the endpoint on which the event was detected +
    +
  • 10.10.10.10
  • +
  • ::1
  • +
  • fe80::1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointMacAddressdynamic-The host MAC address +
    +
  • 0-0-0-0-0-0-0-e0
  • +
  • 00:00:00:ff:ff:ff
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
engineOperationstring-The operation of the engine event +
    +
  • Set Key
  • +
  • Invoke API
  • +
  • Create
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
engVerstring-The engine version +
    +
  • 1.0.0.1123_1.0.0.1101
  • +
  • 9.0.1004
  • +
  • 22.540.1001
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
eventDataAccessListstring-The list of requested access rights +
    +
  • %%4416
  • +
  • %%4417
  • +
  • %%4418
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataAccessMaskstring-The hexadecimal value of the requested or used permissions during an access attempt +
    +
  • 16
  • +
  • 2147483648
  • +
  • 1048576
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataActionNamestring-The action performed +
    +
  • Language Components Installer
  • +
  • Group Policy Background Processing
  • +
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
eventDataAuthenticationPackageNamestring-The authentication package name of the Windows event data +
    +
  • NTLM
  • +
  • Negotiate
  • +
  • MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataConsumerstring-The recipient of the reported event +
    +
  • HealthDriverEventConsumer="Health Event Consumer"
  • +
  • MemoryEventConsumer="Memory Event Consumer"
  • +
  • SysEventConsumer="System Event Consumer"
  • +
+
Endpoint Sensor
eventDataElevatedTokenstring-Whether the session is elevated and has administrator privileges +
    +
  • %%1842
  • +
  • %%1843
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataFullyQualifiedAssemblyNamestring-The fully qualified .NET assembly name +
    +
  • System.Runtime, Version=6.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
  • +
  • System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
  • +
  • System.Diagnostics.Process, Version=8.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataImpersonationLevelstring-The sign-in session impersonation level +
    +
  • %%1830
  • +
  • %%1832
  • +
  • %%1833
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataIpAddressstring-The IP address for Windows event 4624 which is "An account was successfully logged on" +
    +
  • -
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataLogonProcessNamestring-The name of the Windows event sign in process name +
    +
  • NtLmSsp
  • +
  • Advapi
  • +
  • Advapi
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataLogonTypestring-The logon type for Windows event 4624 which is "An account was successfully logged on" +
    +
  • 3
  • +
  • 5
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataModuleILPathstring-The CIL image path of the module or the dynamic module name +
    +
  • C:\Program Files\Cymulate\Agent\System.Threading.dll
  • +
  • C:\windows\system32\tzsync.exe
  • +
  • C:\Program.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataObjectNamestring-The identifying information about the object for which access was requested +
    +
  • \Device\HarddiskVolume2\Windows\System32\lsass.exe
  • +
  • C:\Windows\System32\osk.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataObjectTypestring-The object type +
    +
  • Process
  • +
  • File
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataOperationstring-Windows event 11 +
    +
  • Start IWbemServices::ExecQuery - root\ccm : select * from SMS_Authority
  • +
  • Start IWbemServices::ExecQuery - root\cimv2 : select * from win32_process
  • +
  • Start IWbemServices::ExecQuery - root\ccm : SELECT * FROM SMS_Authority
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataPathstring-The path of the Windows event data +
    +
  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\officesvcmgr.exe
  • +
  • taskhostw.exe
  • +
  • gpupdate.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataProviderNamestring-The name of the Windows event data provider +
    +
  • SmsClientMethodProvider
  • +
  • MS_NT_EVENTLOG_PROVIDER
  • +
  • RegProv
  • +
+
Endpoint Sensor
eventDataProviderPathstring-The file path of the Windows event data provider +
    +
  • %systemroot%\system32\wbem\ntevt.dll
  • +
  • %systemroot%\system32\wbem\stdprov.dll
  • +
  • C:\WINDOWS\CCM\smsclient.dll
  • +
+
Endpoint Sensor
eventDataServiceFileNamestring-The full file path of the service executable file +
    +
  • %SystemRoot%\PSEXESVC.exe
  • +
  • C:\Windows\System32\svchost.exe -k WinSysRestoreGroup
  • +
+
Endpoint Sensor
eventDataServiceNamestring-The service name +
    +
  • PSEXESVC
  • +
  • WinResSvc
  • +
+
Endpoint Sensor
eventDataStatusstring-The Windows event data status +
    +
  • 0xc000006d
  • +
  • -1073741715
  • +
  • 0xc000006e
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataSubjectUserNamestring-The account name +
    +
  • dadmin
  • +
  • Alex
  • +
  • london$
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataSubStatusstring-The Windows event data sub status +
    +
  • 0xc0000064
  • +
  • 0xc000006a
  • +
  • -1073741724
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTargetDomainNamestring-The target sign-in account domain or computer name +
    +
  • NT AUTHORITY
  • +
  • Builtin
  • +
  • SHOCKWAVE
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTargetNamestring-The service, application, or network resource name +
    +
  • Microsoft_RssPlatform_*
  • +
  • WindowsLive:target=virtualapp/didlogical
  • +
  • MicrosoftOffice*
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTaskNamestring-The task name logged by the Windows event +
    +
  • \Microsoft\Windows\LanguageComponentsInstaller\Installation
  • +
  • \Microsoft\Office\Office Serviceability Manager
  • +
  • \MicrosoftEdgeUpdateTaskMachineUA
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTicketEncryptionTypestring-The cryptographic suite used for the Kerberos TGS +
    +
  • 0x12
  • +
  • 0x17
  • +
  • 0x18
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTicketOptionsstring-The authentication request Kerberos ticket behavior and permissions flags +
    +
  • 0x40810000
  • +
  • 0x40810010
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataUserContextstring-The user context of the Windows event data +
    +
  • MP\MPBSA179345$
  • +
  • MP\MPBSASPU179370$
  • +
  • MP\MPBSA4025625$
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataWorkstationNamestring-The name of the computer used in the sign-in attempt +
    +
  • WIN-GG82ULGC9GO
  • +
  • DESKTOP-123ABC
  • +
  • CLIENT01
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventHashIdstring-The event hash ID +
    +
  • -8406473586387535914
  • +
  • 138486453338666581
  • +
  • -7909265752378976284
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdint-Event type- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventMessagestring-The event message[0x13bb4e2a0] activating connection: mach=true listener=false peer=false name=com.apple.airportd +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubIdint-The access type +
    +
  • 2 - TELEMETRY_PROCESS_CREATE
  • +
  • 101 - TELEMETRY_FILE_CREATE
  • +
  • 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventSubNamestring-The event type sub-name +
    +
  • IPS Detection
  • +
  • Personal Firewall
  • +
  • Attack Discovery
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
eventTimereal-The time the agent detected the event1657781088000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
firstSeenreal-The first time the event was seen1656355418449 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The domain name +
    +
  • localhost
  • +
  • wpad
  • +
  • settings-win.data.microsoft.com
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
httpRefererstringURLThe HTTP header referer +
    +
  • http://10.10.10.10/
  • +
  • http://fake/home/
  • +
  • http://fake.com/page/Test.jsp
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
importTabledynamic-The imported table information-Endpoint Sensor
importTableFileNamedynamic-The library file name which has imported functions +
    +
  • KERNEL32.dll
  • +
  • ADVAPI32.dll
  • +
+
Endpoint Sensor
importTableFunctionNamedynamic-The imported function file name +
    +
  • SwitchToThread/GetSystemInfo
  • +
  • OpenProcessToken
  • +
+
Endpoint Sensor
instanceAccountIdstring-The cloud account ID of the virtual machine that made the request111111111111Endpoint Sensor
instanceIdstring-The ID of the instance that indicates the meta-cloud or data center VM +
    +
  • 52294e7b-f732-c6e9-b2c3-7a6b6f50d101
  • +
  • 00030912-c5e7-4348-9012-7c684751c531
  • +
  • 0008ae58-db0c-34ee-3e5c-5dfc9b10a739
  • +
  • i-0b22a22eec53b9321
  • +
  • /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0
  • +
  • ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Network Security
  • +
+
instanceIdstring-The virtual machine instance ID on the cloud platformi-01234567890abcdef +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
instanceNamestring-The virtual machine that made the requestec2-123-124-0-12.us-west-2.compute.amazonaws.comEndpoint Sensor
integrityLevelint-The integrity level of a process16384Endpoint Sensor
integrityLevelint-The integrity level of a process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
lastSeenreal-The last time the event was seen1656355418449 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
logonUserdynamicUserAccountThe logon user name +
    +
  • root
  • +
  • SISTEMA
  • +
  • oracle
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
messageTypestring-The message typeDefault +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
mpnamestring-The management product name +
    +
  • Cloud One - Workload Security
  • +
  • Apex Central
  • +
  • Deep Security Software
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
+
mpverstring-The product version +
    +
  • Microsoft-Windows-Security-Auditing
  • +
  • Level -- Medium security
  • +
  • TASK1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
nativeDeviceCharacteristicsint-Additional driver device information +
    +
  • 393217
  • +
  • 131072
  • +
  • 131088
  • +
+
Endpoint Sensor
nativeDeviceTypeint-The underlying hardware type of the driver +
    +
  • 2
  • +
  • 7
  • +
  • 20
  • +
+
Endpoint Sensor
nativeStorageDeviceBusTypeint-The bus type to which the device is connected +
    +
  • 2
  • +
  • 17
  • +
+
Endpoint Sensor
networkInterfaceIdstring-The network interface of the virtual machine that made the requesteni-01234567890abcdefEndpoint Sensor
objectActionsdynamic-The object process actions +
    +
  • ProcessDump
  • +
  • FileCollection
  • +
+
Endpoint Sensor
objectApiHookNumint-The API hook number of the object1Endpoint Sensor
objectApiNamestring-The API nameGetIpNetTableEndpoint Sensor
objectApiNamestring-The name of the executed APIGetIpNetTableEndpoint Sensor
objectApiRvInNumstring-The API telemetry return value0Endpoint Sensor
objectAppNamestring-Name of the app involved in the AMSI event +
    +
  • Exchange Server 2016
  • +
  • PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.19041.1
  • +
  • PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.14393.0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectArtifactIdsdynamic-The artifact IDs generated by objectAction +
    +
  • 00000000-0000-0000-0000-000000000000_0.dmp
  • +
  • 11111111-1111-1111-1111-111111111111_2.bak
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectAuthIdstring-The object authorization ID +
    +
  • 999
  • +
  • 996
  • +
  • 997
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectBmDatastring-The data of BM event +
    +
  • {"provider":"ORCA","schema_version":1,"data":[{"str":"Access /proc/<pid>/*"}]}
  • +
  • {"provider":"ORCA","schema_version":1,"data":[{"str":"source '/etc/profile.d/lang.sh'"}]}
  • +
  • {"provider":"ORCA","schema_version":1,"data":[{"str":"source '/etc/profile.d/bash_completion.sh'"}]}
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
objectCmddynamicCLICommandThe object process command line +
    +
  • C:\WINDOWS\system32\wbem\wmiprvse.exe -Embedding
  • +
  • "C:\WINDOWS\system32\WindowsPowerShell\v1.0\PowerShell.exe" -NoLogo -Noninteractive -NoProfile -ExecutionPolicy Bypass "& 'C:\WINDOWS\CCM\SystemTemp\afd6f0e5-e491-4764-a20a-9f1d9edf3cce.ps1'"
  • +
  • C:\WINDOWS\system32\lsass.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
objectCmdstringCLICommandCommand line entry of target process +
    +
  • wc -l
  • +
  • runc init
  • +
  • docker-init --version
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectContentNamestring-The AMSI object content name +
    +
  • C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.2\PowerShellGet.psd1
  • +
  • c:\synclog\BLAST_SCAN.vbs
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectCreateDispositionsint-The disposition of CreateFile-Endpoint Sensor
objectCurrentFileSizelong-Previous size of modified object file +
    +
  • 59456
  • +
  • 60
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectDesiredAccessint-The desired access of the event-Endpoint Sensor
objectFileAttributesint-The new file attributes +
    +
  • 2
  • +
  • 32
  • +
  • 8192
  • +
+
Endpoint Sensor
objectFileAttributesHashIdstring-The hash ID of the file attribute meta information +
    +
  • 1626660901647460150
  • +
  • -3744588546027069975
  • +
  • 8709345175736065179
  • +
+
Endpoint Sensor
objectFileCreationstring-The time the object file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1648279273000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileCurrentAttributesint-The original file attributes +
    +
  • 34
  • +
  • 8224
  • +
+
Endpoint Sensor
objectFileCurrentOwnerNamestring-The current owner name of the object file +
    +
  • NT AUTHORITY\SYSTEM
  • +
  • BUILTIN\Administrators
  • +
  • BUILTIN\Administradores
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileCurrentOwnerSidstring-The current security identifier owner of the object file +
    +
  • S-1-5-18
  • +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileDaclStringstring-The discretionary access control list of the object file +
    +
  • D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;OICI;GA;;;SY)(A;OICI;0xa0120000;;;WD)(A;OICI;GA;;;BA)
  • +
  • D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;AC)(A;ID;0x1200a9;;;S-1-15-2-2)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileExtendedAttributestring-The extended attributes of the file +
    +
  • com.apple.quarantine
  • +
  • com.apple.metadata:kMDItemWhereFroms
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileGroupNamestring-The object file user group name +
    +
  • wheel
  • +
  • staff
  • +
  • admin
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileGroupSidstring-The security identifier of the object file group +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-21-397955417-626881126-188441444-513
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashIdstring-The object file hash ID +
    +
  • 2141057820373638746
  • +
  • -6516669617381620295
  • +
  • -4912169863817247597
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashMd5stringFileMD5The MD5 of the object +
    +
  • 801E8003C257C8F540B20F1E0DECD3A6
  • +
  • CDA48FC75952AD12D99E526D0B6BF70A
  • +
  • D5120786925038601A77C2E1EB9A3A0A
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashMd5stringFileMD5The md5 hash of target process image or target file +
    +
  • 7ac47235c7bb452a03d3afd872f44c9e
  • +
  • c9873d83a969645a97f21adc1b164cc5
  • +
  • 3b32b378c8b288de6f15e1607a8c2145
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashSha1stringFileSHA1The SHA-1 of the objectFilePath object +
    +
  • 51B8646308EE0B68AD1F7F1291B85395434DE49A
  • +
  • 36C5D12033B2EAF251BAE61C00690FFB17FDDC87
  • +
  • 2586528000199793730B05D3F169BCF139E4D7A1
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashSha1stringFileSHA1The SHA1 hash of target process image or target file +
    +
  • ded3833f145989fd86c1f4811b61497298ebc7fd
  • +
  • c4fa06404142f1994431f9eef3df2cbe0f1998f1
  • +
  • 3c01d486ed5aa1ecc2d8f33dc24b0ed59b3e609e
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashSha256stringFileSHA2The SHA-256 of the object (objectFilePath) +
    +
  • A75C85F3B089993E9C042FB82ECB7757E8F460ED8065FC7991CAA38A6DE0F50C
  • +
  • 908B64B1971A979C7E3E8CE4621945CBA84854CB98D76367B791A6E22B5F6D53
  • +
  • 1A2ABAAD8A166B66CA35AB51C7432C5A7E46996472C8174281842896408D7F96
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashSha256stringFileSHA2The SHA256 hash of target process image or target file +
    +
  • 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8
  • +
  • 49fa3e206abf6a1f4546417dbe09f3f06b38847866a4a66de75bd90f39cb6c1c
  • +
  • 0969321ad5a0923f0f03896ad2c10e49290515c44b721d773942a37f62a24893
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileIsRemoteAccessbool-The remote access to the object file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileModifiedTimestring-The time the object file was modified +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1648279273000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileOriginalNamestringFileNameThe original file name of the object image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileOwnerNamestring-The object file owner name +
    +
  • root
  • +
  • NT SERVICE\TrustedInstaller
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileOwnerSidstring-The security identifier of the object file owner +
    +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFilePathstringFileFullPathThe file path of the target process image or target file +
    +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • zwwritevirtualmemory
  • +
  • c:\windows\system32\wbem\wmiprvse.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
objectFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the target process image or target file +
    +
  • /usr/bin/bash
  • +
  • /bin/bash
  • +
  • /opt/folder1/probes/system/processes/processes
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileRemoteAccessbool-The remote access for the object file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileSaclStringstring-The system access control list of the object file +
    +
  • S:NO_ACCESS_CONTROL
  • +
  • S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  • +
  • S:(AU;SAFA;0x1f0116;;;WD)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectFileSizestring-The file size of the object file +
    +
  • 59456
  • +
  • 60
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Data Detection and Response
  • +
+
objectFirstSeenstring-The first time the object was seen +
    +
  • 1656458063638
  • +
  • 1656260547165
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectHashIdlong-The object hash ID +
    +
  • 8576474808125313522
  • +
  • -599270888483415002
  • +
  • 2177864258235728980
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectHostNamestringDomainNameServer name where Internet event was detected +
    +
  • 10.10.10.10
  • +
  • sample.test.org
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectIntegrityLevelint-Integrity level of target process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address of internet event10.10.10.10 +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectIpsdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address list of internet event +
    +
  • ::1
  • +
  • 10.10.10.10
  • +
  • ::ffff:10.10.10.10
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLastSeenstring-The last time the object was seen +
    +
  • 1656458354730
  • +
  • 1656260580722
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLaunchTimestring-The object launch time of the Windows event +
    +
  • 1616412892557
  • +
  • 1620778597056
  • +
  • 1616414113105
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutFailureMessagestring-The sign-in/sign-out error messageLogin incorrect +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutFirstSeenlong-The first time the object sign-in/sign-out was seen1713903612 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutHashIdlong-The FNV of the object sign-in/sign-out meta-8981232070268295229 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutLastSeenlong-The last time the object sign-in/sign-out was seen1713903612 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutMetaTypeint-The sign-in/sign-out meta1 - LOGIN_OUT_META_TYPE_OPENSSH +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutSessionIdlong-The sign-in/sign-out session ID260 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutSourceAddressstring-The sign-in/sign-out source IP10.10.10.10 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutStatusint-The sign-in/sign-out status-1 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectNamestring-The base name of the object file or processnet.exe +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectNamestring-The object name +
    +
  • /usr/bin/bash
  • +
  • /bin/bash
  • +
  • /opt/folder1/probes/system/processes/processes
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectPidint-The object process PID +
    +
  • 17000
  • +
  • 22000
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
objectPidint-The PID of target process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectPipeNamestring-The object pipe name\\.\pipe\F451F406BDEndpoint Sensor
objectPipeNamestring-The named pipe of the event +
    +
  • \\.\pipe\name1
  • +
  • \\serverHostName\pipe\name1
  • +
  • \\serverIp\pipe\name1
  • +
+
Endpoint Sensor
objectPortintPortThe port number used by internet event- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectProcessHashIdlong-FNV of target process +
    +
  • 1415699552492662761
  • +
  • -100650285065767982
  • +
  • -1139416698673814436
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRawDataSizedynamic-The raw data size of the Windows event object +
    +
  • 9
  • +
  • 1
  • +
  • 564
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRawDataStrdynamic-The data contents of the AMSI event +
    +
  • $global:?
  • +
  • 0
  • +
  • $servicename = "WinRM" +$arrService = Get-Service $servicename + +if ($arrService.Status -ne "Running") + +{ + + Restart-Service $servicename + + +} +
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryDatastringRegistryValueDataThe registry data contentsC:\Program Files\AlertMedia\AlertMedia Desktop Notifications\AlertMedia.exe +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRegistryDatastringRegistryValueDataThe registry value data +
    +
  • {11111111-1111-1111-1111-111111111111}
  • +
  • 1
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryKeyHandlestringRegistryKeyThe registry key path +
    +
  • HKCR\CID\{00000000-0000-0000-0000-000000000001}
  • +
  • HKLM\SOFTWARE\WOW6432Node\Eos
  • +
  • HKCU\SOFTWARE\Cerner\InstantAccess
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryKeyHandlestringRegistryKeyThe registry key +
    +
  • HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
  • +
  • HKLM\system\currentcontrolset\services\w32time\config
  • +
  • HKLM\system\currentcontrolset\services\tcpip\parameters
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryRootstring-The name of the object registry root key +
    +
  • HKCR
  • +
  • HKLM
  • +
  • HKCU
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRegistryRootint-The Windows Registry Root ID +
    +
  • 3
  • +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryValuestringRegistryValueThe registry value name +
    +
  • 1
  • +
  • key
  • +
  • reg
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRegistryValuestringRegistryValueRegistry value name +
    +
  • lastknowngoodtime
  • +
  • threadingmodel
  • +
  • epoch
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegTypeint-The registry value type-Endpoint Sensor
objectRegTypeint-The Windows Registry Type ID +
    +
  • 1
  • +
  • 11
  • +
  • 4
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRunAsLocalAccountbool-The "runas" command uses a local account +
    +
  • 1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSessionIdstring-The object session ID +
    +
  • 0
  • +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSignerdynamic-The list of object process signers +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
  • SecureWorks Inc
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectSignerdynamic-Certificate signer of object process or file +
    +
  • Microsoft Windows
  • +
  • Software Signing;Apple Code Signing Certification Authority;Apple Root CA;
  • +
  • Microsoft Corporation
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSignerFlagsAdhocdynamic-The list of object process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
objectSignerFlagsAdhocdynamic-The list of object process or file signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSignerFlagsLibValiddynamic-The list of object process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
objectSignerFlagsLibValiddynamic-The list of object process or file signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSignerFlagsRuntimedynamic-The list of object process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
objectSignerFlagsRuntimedynamic-The list of object process or file signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSignerValiddynamic-Whether each signer of the object process is valid-Endpoint Sensor
objectSignerValiddynamic-Validity of certificate signer +
    +
  • 1
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSubTrueTypeint-File object's true sub-type +
    +
  • 5000
  • +
  • 18000
  • +
  • 28001
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectTrueTypeint-File object's true major type +
    +
  • 7
  • +
  • 5
  • +
  • 18
  • +
  • 4051
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectTypestring-The object type +
    +
  • file
  • +
  • process
  • +
  • qil
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • File Security
  • +
+
objectUserstringUserAccountThe owner name of the target process or the login user name +
    +
  • root
  • +
  • SYSTEM
  • +
  • oracle
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
objectUserDomainstring-The object user domain +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectUserGroupstring-The user group name +
    +
  • staff
  • +
  • _spotlight
  • +
  • wheel
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectUserGroupSidsdynamic-The user group SIDs of the object +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-21-3770350686-3666354711-3866293128-513
  • +
+
Endpoint Sensor
osDescriptionstring-The OS version +
    +
  • Windows 10 (64 bit)
  • +
  • Windows 10 Pro (64 bit) build 19044
  • +
  • Amazon Linux 2 (64 bit) (5.4.188-104.359.amzn2.x86_64)
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osNamestring-The host operating system name +
    +
  • Windows
  • +
  • Linux
  • +
  • macOS
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osTypestring-The host operating system type +
    +
  • 0x00000030
  • +
  • 4
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osVerstring-The version of the host operating system +
    +
  • Amazon Linux 2
  • +
  • 10.0.19044
  • +
  • 10.0.19042
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentAuthIdstring-The parent authorization ID +
    +
  • 999
  • +
  • 996
  • +
  • 997
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentCmdstringCLICommandThe command line of the subject parent process +
    +
  • "C:\Tiburon\CommandCAD\Test\Startup.exe"
  • +
  • C:\WINDOWS\Explorer.EXE
  • +
  • C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s Appinfo
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
parentCmdstringCLICommandThe command line entry of the parent process +
    +
  • C:\WINDOWS\system32\services.exe
  • +
  • C:\Windows\system32\services.exe
  • +
  • /sbin/launchd
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileCreationstring-The time the parent file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172968000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileCurrentOwnerNamestring-The current owner name of the parent file +
    +
  • NT AUTHORITY\SYSTEM
  • +
  • BUILTIN\Administradores
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileCurrentOwnerSidstring-The current security identifier owner of the parent file +
    +
  • S-1-5-32-544
  • +
  • S-1-5-18
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileDaclStringstring-The discretionary access control list of the parent file +
    +
  • D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;OICI;GA;;;SY)(A;OICI;0xa0120000;;;WD)(A;OICI;GA;;;BA)
  • +
  • D:(A;ID;0x1200a9;;;AC)(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;S-1-15-2-2)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileGroupNamestring-The name of the parent file user group +
    +
  • wheel
  • +
  • admin
  • +
  • staff
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileGroupSidstring-The security identifier of the parent process file group +
    +
  • S-1-5-18
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-32-544
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashIdlong-The parent file hash ID +
    +
  • -4092577940452904134
  • +
  • 2141057820373638746
  • +
  • -821808160829839906
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashMd5stringFileMD5The MD5 of the subject parent process +
    +
  • 7B9E6D992AA86F0D2ECDF8F65A6BB792
  • +
  • 2B47C89252BB932B292122E54C3DAF25
  • +
  • CD10CB894BE2128FCA0BF0E2B0C27C16
  • +
+
Endpoint Sensor
parentFileHashMd5stringFileMD5The md5 hash of parent process +
    +
  • d8e577bf078c45954f4531885478d5a9
  • +
  • cd10cb894be2128fca0bf0e2b0c27c16
  • +
  • cfd65bed18a1fae631091c3a4c4dd533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashSha1stringFileSHA1The SHA-1 of the subject parent process +
    +
  • 9CF40F19A625F7033689D04F4C8E1CC6A8FA4F5B
  • +
  • 799AB02945EDB9A37A42A3F742DE73165F4A9665
  • +
  • 1F912D4BEC338EF10B7C9F19976286F8ACC4EB97
  • +
+
Endpoint Sensor
parentFileHashSha1stringFileSHA1The SHA1 hash of parent process +
    +
  • d7a213f3cfee2a8a191769eb33847953be51de54
  • +
  • 1f912d4bec338ef10b7c9f19976286f8acc4eb97
  • +
  • 9ad737cbd8bbdddc96726156dbd3bc03936bf02f
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashSha256stringFileSHA2The SHA-256 of the subject parent process +
    +
  • 14A1223722D486ABBC88682AB49AF8E56DC65AC4E153027985BFFFF7C815C0EC
  • +
  • 2EF51284CA9211ADEC3E8E095F386FEC742E0532075894AE99024C65949F935E
  • +
  • F3FEB95E7BCFB0766A694D93FCA29EDA7E2CA977C2395B4BE75242814EB6D881
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • TXOne StellarOne
  • +
+
parentFileHashSha256stringFileSHA2The SHA256 hash of parent process +
    +
  • dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674
  • +
  • f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881
  • +
  • 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileModifiedTimestring-The time the parent file was modified +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172968000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileOriginalNamestringFileNameThe original file name of the parent image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileOwnerNamestring-The owner name of the parent file +
    +
  • root
  • +
  • cit
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileOwnerSidstring-The security identifier of the parent file owner +
    +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFilePathstringFileFullPathThe full file path of the parent process +
    +
  • c:\windows\explorer.exe
  • +
  • c:\tiburon\commandcad\test\startup.exe
  • +
  • c:\windows\system32\svchost.exe
  • +
+
Endpoint Sensor
parentFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the parent process +
    +
  • c:\windows\system32\services.exe
  • +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileRemoteAccessbool-The remote access to the parent file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileSaclStringstring-The system access control list of the parent file +
    +
  • S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  • +
  • S:NO_ACCESS_CONTROL
  • +
  • S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
parentFileSizestring-The file size of the parent file +
    +
  • 714856
  • +
  • 59952
  • +
  • 5114880
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentHashIdstring-The FNV of the parent process +
    +
  • -1364311042632324339
  • +
  • 1879227689087156956
  • +
  • 4246064157470561345
  • +
+
Endpoint Sensor
parentHashIdlong-The parent hash ID +
    +
  • -865367326691173681
  • +
  • -2903238741593506113
  • +
  • -4358168316031740439
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentIntegrityLevelint-The integrity level of a parent16384Endpoint Sensor
parentIntegrityLevelint-The integrity level of a parent- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentLaunchTimereal-The time when the parent process was launched +
    +
  • 1653614773895
  • +
  • 1656118625928
  • +
  • 0
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentNamestring-The image name of the parent process +
    +
  • explorer.exe
  • +
  • startup.exe
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
parentNamestring-The image name of the parent process +
    +
  • c:\windows\system32\services.exe
  • +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentPayloadSignerdynamic-The signer name list of the parent process payload +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
+
Endpoint Sensor
parentPayloadSignerFlagsAdhocdynamic-The list of parent process payload signature adhoc flags-Endpoint Sensor
parentPayloadSignerFlagsLibValiddynamic-The list of parent process payload signature library validation flags-Endpoint Sensor
parentPayloadSignerFlagsRuntimedynamic-The list of parent process payload signature runtime flags-Endpoint Sensor
parentPayloadSignerValiddynamic-Whether each signer of the parent process payload is valid-Endpoint Sensor
parentPidint-The PID of the parent process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
parentPidint-The PID of the parent process +
    +
  • 1
  • +
  • 976
  • +
  • 920
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSessionIdint-The parent session ID- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSignerdynamic-The signers of the parent process +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
  • Azul Systems, Inc.
  • +
+
Endpoint Sensor
parentSignerdynamic-The signer of the parent file +
    +
  • Microsoft Windows Publisher
  • +
  • Microsoft Windows
  • +
  • Software Signing;Apple Code Signing Certification Authority;Apple Root CA;
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSignerFlagsAdhocdynamic-The list of parent process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsAdhocdynamic-The list of parent process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSignerFlagsLibValiddynamic-The list of parent process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsLibValiddynamic-The list of parent process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSignerFlagsRuntimedynamic-The list of parent process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsRuntimedynamic-The list of parent process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSignerValiddynamic-Whether each signer of the parent process is valid-Endpoint Sensor
parentSignerValiddynamic-The validity of the parent signer- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSubTrueTypeint-The true file subtype of the parent file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentTrueTypeint-The true file type of the parent file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentUserstring-The type of user that executed the parent process +
    +
  • root
  • +
  • SYSTEM
  • +
  • SISTEMA
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentUserDomainstring-The user domain of the parent process +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentUserGroupSidsdynamic-The SIDs of the parent user group +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-21-3770350686-3666354711-3866293128-513
  • +
+
Endpoint Sensor
patVerstring-The version of the behavior pattern +
    +
  • 35.1053.00
  • +
  • 630
  • +
  • 35.1071.00
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Cloud App Security
  • +
+
plangint-The product language +
    +
  • 1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
platformAssetTagsdynamic-The list of platform custom asset tags{"Asset group":["finance"], "some.ip": ["10.1.0.1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
platformAssetTagsdynamic-The list of platform custom asset tags{"Asset group":["finance"], "some.ip": ["10.1.0.1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-Internal product ID (Deprecated, use productCode) +
    +
  • 2200
  • +
  • 751
  • +
  • 533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
policyIdstring-The policy ID of which the event was detected +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 007
  • +
  • 003
  • +
  • TM000001
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
pplatint-The product platform +
    +
  • 5889
  • +
  • 9217
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processActionsdynamic-The process actions +
    +
  • ProcessDump
  • +
  • FileCollection
  • +
+
Endpoint Sensor
processArtifactIdsdynamic-The artifact IDs generated by processAction +
    +
  • 00000000-0000-0000-0000-000000000000_1.dmp
  • +
  • 11111111-1111-1111-1111-111111111111_2.bak
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processCmdstringCLICommandThe subject process command line +
    +
  • "C:\Program Files (x86)\AADM\AADM.exe"
  • +
  • /usr/lib/inet/sendmail -bl -q15m
  • +
  • ComDir
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
processCmdstringCLICommandThe command line entry of the subject process +
    +
  • C:\Windows\system32\lsass.exe
  • +
  • C:\WINDOWS\system32\lsass.exe
  • +
  • nimbus(processes)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileCreationstring-The time the process file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172906000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileCurrentOwnerNamestring-The current owner name of the process file +
    +
  • NT AUTHORITY\SYSTEM
  • +
  • BUILTIN\Administrators
  • +
  • BUILTIN\Administradores
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileCurrentOwnerSidstring-The owner of the process file current security identifier +
    +
  • S-1-5-18
  • +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileDaclStringstring-The discretionary access control list of the process file +
    +
  • D:(A;ID;0x1200a9;;;AC)(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;ID;FA;;;SY)
  • +
  • D:(A;ID;FA;;;BA)(A;ID;FA;;;SY)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileGroupNamestring-The name of the process file user group +
    +
  • wheel
  • +
  • admin
  • +
  • staff
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileGroupSidstring-The security identifier of the process file group +
    +
  • S-1-5-18
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-32-544
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashIdlong-The file hash of the process +
    +
  • 2141057820373638746
  • +
  • -821808160829839906
  • +
  • 5222963427542927736
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashMd5stringFileMD5The MD5 of the subject process +
    +
  • D07ADD0CE6E000D3CD20193B891E8ED3
  • +
  • 1a9ba93ebe4cb60030831f8ce9e7d5f9
  • +
  • EEE6691B48D2FB604DDF0CBC90D75B0E
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
processFileHashMd5stringFileMD5The MD5 hash of the subject process image +
    +
  • cd10cb894be2128fca0bf0e2b0c27c16
  • +
  • 7ac47235c7bb452a03d3afd872f44c9e
  • +
  • cfd65bed18a1fae631091c3a4c4dd533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha1stringFileSHA1The SHA-1 of the subject process +
    +
  • C0885381EBAC94AB20E78936434FA208F6B65352
  • +
  • ac373ed32b491da22924e2e11e36574e5d582a35
  • +
  • DF93F7DF887E86C3B56539B5046B286001C6F150
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha1stringFileSHA1The SHA1 hash of subject process image +
    +
  • 1f912d4bec338ef10b7c9f19976286f8acc4eb97
  • +
  • ded3833f145989fd86c1f4811b61497298ebc7fd
  • +
  • 9ad737cbd8bbdddc96726156dbd3bc03936bf02f
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha256stringFileSHA2The SHA-256 of the subject process +
    +
  • 4314A869B8DAE1BD3FFF810B1366E90FB7C961D4A3424260692377FDD87361D2
  • +
  • 7824c45fc033696603fe97d8f193a1872dfb2b5db75f0cda21df27017b3cb623
  • +
  • 1A6D5986EFEAE89308D9EE11B4A7907012603392E0E66D0E529DB09DF1B4CB64
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
processFileHashSha256stringFileSHA2The SHA256 hash of subject process image +
    +
  • f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881
  • +
  • 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8
  • +
  • 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileModifiedTimestring-The time the process file was modified +
    +
  • 1652131848000
  • +
  • 1633413236462
  • +
  • 1414554708877
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileOriginalNamestringFileNameThe original file name of the process image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileOwnerNamestring-The process file owner name +
    +
  • root
  • +
  • cit
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileOwnerSidstring-The security identifier of the process file owner +
    +
  • S-1-5-32-544
  • +
  • S-1-5-18
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFilePathstring +
    +
  • ProcessFullPath
  • +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the subject process +
    +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • c:\windows\syswow64\srts\wmipr.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
processFilePathstring +
    +
  • ProcessFullPath
  • +
  • ProcessName
  • +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the subject process +
    +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\lsass.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileRemoteAccessbool-The remote access to the process file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileSaclStringstring-The system access control list of the process file +
    +
  • S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  • +
  • S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU)
  • +
  • S:NO_ACCESS_CONTROL
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
processFileSizestring-The file size of the process file +
    +
  • 59952
  • +
  • 59456
  • +
  • 47024
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processHashIdstring-The FNV of the subject process +
    +
  • -2965450813604216022
  • +
  • 7111735426732308768
  • +
  • -7600358934761747729
  • +
+
Endpoint Sensor
processHashIdlong-The FNV of subject process +
    +
  • 7114696589795796819
  • +
  • 1307755369266815004
  • +
  • -5015325378148567246
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processImagePathstring-The process triggered by the file event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
processLaunchTimereal-The time the subject process was launched +
    +
  • 1653614775212
  • +
  • 1656118626642
  • +
  • 1652098160298
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\lsass.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processPayloadSignerdynamic-The signer name list of the process payload +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
+
Endpoint Sensor
processPayloadSignerFlagsAdhocdynamic-The list of process payload signature adhoc flags-Endpoint Sensor
processPayloadSignerFlagsLibValiddynamic-The list of process payload signature library validation flags-Endpoint Sensor
processPayloadSignerFlagsRuntimedynamic-The list of process payload signature runtime flags-Endpoint Sensor
processPayloadSignerValiddynamic-Whether each signer of the process payload is valid-Endpoint Sensor
processPidint-The PID of the subject process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
processPidint-The PID of the subject process +
    +
  • 4
  • +
  • 1
  • +
  • 784
  • +
  • 792
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processPkgNamestring-The process package name +
    +
  • MSTeams
  • +
  • Microsoft.SkypeApp
  • +
+
Endpoint Sensor
processSignerdynamic-The signer name list of the subject process +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processSignerdynamic-The process file signer +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
  • Microsoft Corporation
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processSignerFlagsAdhocdynamic-The list of process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsAdhocdynamic-The list of process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processSignerFlagsLibValiddynamic-The list of process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsLibValiddynamic-The list of process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processSignerFlagsRuntimedynamic-The list of process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsRuntimedynamic-The list of process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processSignerValiddynamic-The validity of the process signer +
    +
  • 1
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processStackTracestring-The process stack trace of the telemetry eventC:\Windows\System32\ntdll.dll?NtCreateUserProcess|ZwCreateUserProcess, C:\Windows\System32\kernelbase.dll!CreateProcessInternalWEndpoint Sensor
processSubTrueTypeint-The true file subtype of the process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processTrueTypeint-The true file type of the process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processUserstringUserAccountThe owner name of subject process image +
    +
  • root
  • +
  • SYSTEM
  • +
  • SISTEMA
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processUserDomainstring-The process user domain +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processUserGroupSidsdynamic-The user group SIDs of the process +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-21-3770350686-3666354711-3866293128-513
  • +
+
Endpoint Sensor
protoint-The protocol type +
    +
  • TELEMETRY_CONNECTION_TCP
  • +
  • TELEMETRY_CONNECTION_UDP
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
providerGUIDstring-The GUID of the Windows event provider{11111111-1111-1111-1111-111111111111} +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
providerNamestring-The name of the Windows event provider +
    +
  • Microsoft-Windows-Security-Auditing
  • +
  • Microsoft-Windows-WMI-Activity
  • +
  • Microsoft-Windows-TaskScheduler
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
proxystring-The proxy address +
    +
  • proxy.sample:8080
  • +
  • 10.10.10.10:8080
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
publicSptintPortThe public port of the endpoint making the request57163Endpoint Sensor
publicSrcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The public ip of the endpoint making the request10.10.10.10Endpoint Sensor
pverstring-The product version +
    +
  • 1.2.0.2752
  • +
  • 1.0.345
  • +
  • 1.2.0.2657
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
rawDataSizestring-The size of the Windows event log +
    +
  • 1128
  • +
  • 1129
  • +
  • 1127
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
rawDataStrstring-Windows event raw contents +
    +
  • { + "EventData" : { + "LogonType" : "", + "TargetDomainName" : "", + "TargetLogonId" : "", + "TargetUserName" : "", + "TargetUserSid" : "" + } +} +
  • +
  • { + "EventData" : { + "LogonType" : "10", + "TargetDomainName" : "AFASADV", + "TargetLogonId" : "14941011731", + "TargetUserName" : "administrator", + "TargetUserSid" : "S-1-5-21-1507008304-2416677881-2121376573-500" + } +} +
  • +
  • { + "EventData" : { + "LogonType" : "10", + "TargetDomainName" : "AIS", + "TargetLogonId" : "216921070", + "TargetUserName" : "MWoodr01", + "TargetUserSid" : "S-1-5-21-1873864278-1756520048-3043165120-15057" + } +} +
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
regionIdstring-The cloud asset region +
    +
  • US East (N. Virginia)
  • +
  • Europe (Frankfurt)
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
requeststringURLRequest URL +
    +
  • http://10.10.10.10/fake/site
  • +
  • http:///fake/param.cgi?action=list&group=Alarm.Status
  • +
  • http://fake.com/
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
requestMethodstring-The network protocol request method +
    +
  • GET
  • +
  • POST
  • +
  • PUT
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
riskLevelstring-The risk level +
    +
  • 1
  • +
  • high
  • +
  • No Risk
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
rtstring-The event time1657781088000 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
ruleIdint-The rule ID1005566 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
sessionIdint-The session ID +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
smbSharedNamestring-The shared folder name for the server that contains the files to be openedC:\sharedfolderEndpoint Sensor
smbSharedNamestring-The shared folder name for the server that contains the filessharedfolderEndpoint Sensor
sourceTypestring-The source type +
    +
  • user defined
  • +
  • sandbox
  • +
  • syscall
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
  • Endpoint Sensor
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
sptintPortThe source port number +
    +
  • 53
  • +
  • 5353
  • +
  • 443
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
srcFileCreationstring-The time the source file was created +
    +
  • 1577865600000
  • +
  • 1626201752000
  • +
  • 1626201750000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileCurrentOwnerNamestring-The current owner name of the source file +
    +
  • NT AUTHORITY\SYSTEM
  • +
  • BUILTIN\Administrators
  • +
  • AUTORIDADE NT\SISTEMA
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileCurrentOwnerSidstring-The current security identifier owner of the source file +
    +
  • S-1-5-18
  • +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileDaclStringstring-The discretionary access control list of the source file +
    +
  • D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;AC)(A;ID;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcFileGroupNamestring-The source file user group name +
    +
  • wheel
  • +
  • staff
  • +
  • NT SERVICE\TrustedInstaller
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileGroupSidstring-The security identifier of the source file group +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-21-3770350686-3666354711-3866293128-513
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileHashIdlong-The source file hash ID +
    +
  • 1102079405020678318
  • +
  • -6926286289273504319
  • +
  • 8528955148329941480
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileHashMd5stringFileMD5The md5 hash of source file +
    +
  • e5d5e9c1f65b8ec7aa5b7f1b1acdd731
  • +
  • a6779bf446db07e4c4ba3516b273c496
  • +
  • 4bb7334fdadc6eccb8e6ab402aae013b
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileHashSha1stringFileSHA1The SHA1 hash of source file +
    +
  • 5d34902fecc1760138212ada36be1e742bda5e52
  • +
  • dbb14dcda6502ab1d23a7c77d405dafbcbeb439e
  • +
  • 2292f8109cd756e790c068a52d50f1b0858f503b
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileHashSha256stringFileSHA2The SHA256 hash of source file +
    +
  • 4eaa002225f4ea2dedcd19b7f1337d7c58ea7dd6d4571c12468dde95e6bcfdaf
  • +
  • e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80
  • +
  • 16b20a3ad485b4fbbe3028c7e743b226db21ea93cacc8b3d7d7d4a731bf02333
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileIsRemoteAccessbool-The remote access of the source file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileModifiedTimestring-The time the source file was modified +
    +
  • 1626201752000
  • +
  • 1626201750000
  • +
  • 1577865600000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileOwnerNamestring-The source file owner name +
    +
  • root
  • +
  • NT SERVICE\TrustedInstaller
  • +
  • NT AUTHORITY\SYSTEM
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileOwnerSidstring-The security identifier of the source file owner +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-32-544
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The source file path +
    +
  • \\cnva-apps\megaclockprod\traveler\travelerprint.accdb
  • +
  • c:\program files\common files\microsoft shared\clicktorun\officesvcmgrschedule.xml
  • +
  • q:\a7_dbs\a4_pkg\a4_packaging.accde
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileSaclStringstring-The system access control list of the source file +
    +
  • S:NO_ACCESS_CONTROL
  • +
  • S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  • +
  • S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileSizestring-The file size of the source file +
    +
  • 0
  • +
  • 131072
  • +
  • 196608
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Data Detection and Response
  • +
+
srcFirstSeenstring-The first time the source file was seen +
    +
  • 0
  • +
  • 1656355418449
  • +
  • 1656714760440
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcHashIdlong-The source hash ID +
    +
  • 4070054759888344851
  • +
  • 2177864258235728980
  • +
  • 3476454206648023552
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcLastSeenstring-The last time the source file was seen +
    +
  • 0
  • +
  • 1656355418449
  • +
  • 1656715147313
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSignerdynamic-The signer of the source file +
    +
  • Microsoft Windows
  • +
  • Microsoft Corporation
  • +
  • Google LLC
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcSignerFlagsAdhocdynamic-The list of source file signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSignerFlagsLibValiddynamic-The list of source file signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSignerFlagsRuntimedynamic-The list of source file signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSignerValiddynamic-The validity of the source file signer- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcSubTrueTypeint-The true file subtype of the source file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcTrueTypeint-The true file type of the source file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
statusstring-The HTTP response status code +
    +
  • 200
  • +
  • 500
  • +
  • 403
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
subnetIdstring-The subnet ID of the virtual machine that made the requestsubnet-01234567890abcdefEndpoint Sensor
subSystemstring-The sub system informationcom.apple.xpc +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
suspiciousObjectstring-The matched suspicious object36ba9de3da9e6f8abfffdda7787ab0ecc16724bbEndpoint Sensor
suspiciousObjectTypestring-The matched suspicious object typesha1Endpoint Sensor
tacticIddynamicTacticThe list of MITRE tactic IDs +
    +
  • TA0011
  • +
  • TA0008
  • +
  • TA0001
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
timezonestring-The host time zone +
    +
  • UTC+00:00
  • +
  • UTC-05:00
  • +
  • UTC-03:00
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
triggerReasonstring-The cause of the triggered action +
    +
  • FILEMETA.T1027.009.TRICKBOT.SMITRE1B2, T1027.009
  • +
  • ST002
  • +
  • Scheduled Scan (custom)
  • +
  • Scheduled Scan (system)
  • +
  • Remote Scan: the user triggered the Apex One agent from the Trend Vision One console
  • +
  • Manual Scan: the user triggered the local agent
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
userDomaindynamic-The user domain name +
    +
  • CORP
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
vpcIdstring-The virtual private cloud that contains the cloud assetvpc-01234567890abcdef +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
winEventIdint-Event ID of Windows event +
    +
  • 11
  • +
  • 4624
  • +
  • 4670
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 377 +- **Layer:** Endpoint +- **Product:** Endpoint Sensor + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Endpoint/Trend Cloud One - Endpoint & Workload Security.md b/pages/Endpoint/Trend Cloud One - Endpoint & Workload Security.md new file mode 100644 index 0000000..a48aab8 --- /dev/null +++ b/pages/Endpoint/Trend Cloud One - Endpoint & Workload Security.md @@ -0,0 +1,6165 @@ +--- +layout: default +title: Trend Cloud One - Endpoint & Workload Security - Endpoint +--- + +# Trend Cloud One - Endpoint & Workload Security +**Layer:** Endpoint + +This documentation provides detailed information about all fields available for Trend Cloud One - Endpoint & Workload Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
actResultdynamic-The result of an action +
    +
  • Dropped
  • +
  • Successful
  • +
  • Accepted
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • Mobile Security
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
behaviorCatstring-The matched policy category +
    +
  • Policy Enforcement
  • +
  • Grey-Detection
  • +
  • Threat-Detection
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
catint-The weighted priority of the incident +
    +
  • 100
  • +
  • 200
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
categorystring-The event category +
    +
  • Exploits
  • +
  • Reconnaissance
  • +
  • Vulnerabilities
  • +
  • Security Policy
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Mobile Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
censusMaturityValueint-The CENSUS maturity value +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
censusPrevalenceValueint-The CENSUS prevalence value +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
cloudProviderstring-The service provider of the cloud asset +
    +
  • alibaba cloud
  • +
  • aws
  • +
  • azure
  • +
  • gcp
  • +
  • oci
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
cloudProviderstring-The service provider of the cloud asset +
    +
  • aws
  • +
  • azure
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
compressedFileHashstringFileSHA1The SHA-1 of the decompressed archive +
    +
  • 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA
  • +
  • FA71B59F35F0EE44D27F74917EF5A0DA2797E80B
  • +
  • 14D2302172EB81465CE12E01361AE24CDE170F7B
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileHashSha256stringFileSHA2The SHA-256 of the compressed suspicious file +
    +
  • 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F
  • +
  • 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE
  • +
  • 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileNamestringFileNameThe file name of the compressed file +
    +
  • /proc/32058/fd/150
  • +
  • NONAMEFL
  • +
  • /proc/10006/fd/30
  • +
  • VirusActionSample/RPF2_OtherMalwareSample-other.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
customAssetTagsdynamic-The list of custom asset tags{"os":["linux", "windows"], "org":["bu1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
customAssetTagsdynamic-The list of custom asset tags{"os":["linux", "windows"], "org":["bu1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
cvesdynamic-The CVEs associated with this filter +
    +
  • CVE-2014-3567
  • +
  • CVE-2016-6304
  • +
  • CVE-2011-1385
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dceArtifactActionsdynamic-The actions performed on Damage Cleanup Engine artifacts +
    +
  • folder_backup
  • +
  • objproc_dump
  • +
  • subproc_dump
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectedActionsdynamic-The actions performed on detected artifacts +
    +
  • folder_backup
  • +
  • objproc_dump
  • +
  • subproc_dump
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectedBackupArtifactsdynamic-The information about detected artifacts{"objectArtifactId": "025d9f2a-ac9c-4cdf-b9e4-cf20c6e40281_0.dmp", "action": "object_process_dump", "status": 0, "processCreationTime": "1627574338077", "processImageFileName": "C:\Program Files\aaa\bbb\objprocess.exe"} +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectedBackupArtifactsStatusdynamic-The backup status of detected artifacts['0', '-67'] +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectedBackupFolderstring-The folder path for detected backup foldersC:\\Program Files (x86)\\Trend Micro\\artifact\\DCE +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
detectedPatternstring-The detected patterndct.virus +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectionAggregationIdsdynamic-The list of detection aggregation IDs['11111111-1111-1111-1111-111111111111'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
detectionAggressivenessLevelint-The detection aggressiveness level +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
  • 4
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
detectionEngineVersionstring-The detection engine version7.6.0 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectionMetadynamic-The descriptions of the detected techniques['T1204 some description about this technique', 'T1573.001_AES another description about this technique'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
detectionNamesdynamic-The rules that triggered the event['HS_EMOTET.SMAA', 'HM_AVEDOWN.SMZTIG-A', 'HE_DOCQRPHISH.SM'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
dmacstring-The MAC address of the destination IP (dest_ip) +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dptintPortThe destination port number- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dststring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
duserdynamicEmailRecipientThe email recipient +
    +
  • (no user)
  • +
  • SYSTEM
  • +
  • SYSTEM
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointGuidstringEndpointIDHost GUID of the endpoint on which the event was detected11111111-1111-1111-1111-111111111111 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe host name of the endpoint on which the event was detected +
    +
  • PHILIPSIBE09
  • +
  • WHAM6WK8XG2
  • +
  • MacBook-Pro-del-Meno
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the endpoint on which the event was detected10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address of the endpoint on which the event was detected +
    +
  • 10.10.10.10
  • +
  • ::1
  • +
  • fe80::1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointMacAddressdynamic-The host MAC address +
    +
  • 0-0-0-0-0-0-0-e0
  • +
  • 00:00:00:ff:ff:ff
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endTimelong-The time when the last event was received (in Unix milliseconds)1750983926000Trend Cloud One - Endpoint & Workload Security
eventHashIdstring-The event hash ID +
    +
  • -8406473586387535914
  • +
  • 138486453338666581
  • +
  • -7909265752378976284
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdint-Event type- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubIdint-The access type +
    +
  • 4
  • +
  • 101
  • +
  • 102
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TXOne StellarOne
  • +
+
eventSubIdint-The access type +
    +
  • 2 - TELEMETRY_PROCESS_CREATE
  • +
  • 101 - TELEMETRY_FILE_CREATE
  • +
  • 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventSubNamestring-The event type sub-name +
    +
  • IPS Detection
  • +
  • Personal Firewall
  • +
  • Attack Discovery
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
eventTimereal-The time the agent detected the event1657781088000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileOperationstring-The operation of the file +
    +
  • Created
  • +
  • Updated
  • +
  • Deleted
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
filePathstringFileFullPathThe file path without the file name +
    +
  • security
  • +
  • /var/log/audit/audit.log
  • +
  • application
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
filePathNamestringFileFullPathThe file path with the file name +
    +
  • vss
  • +
  • spoolss
  • +
  • /etc/hosts
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
+
firstActstring-The first scan action +
    +
  • Pass
  • +
  • Quarantine
  • +
  • Clean
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
firstActResultstring-The first scan action result +
    +
  • File passed
  • +
  • Unable to quarantine file
  • +
  • File quarantined
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
firstSeenreal-The first time the event was seen1656355418449 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
groupsstring-The OSSEC rule group names +
    +
  • auditd,audit,
  • +
  • dirservice_log,authentication_failure,
  • +
  • windows,authentication_failures,
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
hostIdint-The host ID +
    +
  • 20548
  • +
  • 967
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The computer name of the client host (The hostname from the suspicious URL detected by Deep Discovery Inspector) +
    +
  • Let's Encrypt
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The domain name +
    +
  • localhost
  • +
  • wpad
  • +
  • settings-win.data.microsoft.com
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
httpRefererstringURLThe HTTP referer +
    +
  • http://172.16.58.233/
  • +
  • http://example/page1/
  • +
  • https://www.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
instanceIdstring-The ID of the instance that indicates the meta-cloud or data center VM +
    +
  • 52294e7b-f732-c6e9-b2c3-7a6b6f50d101
  • +
  • 00030912-c5e7-4348-9012-7c684751c531
  • +
  • 0008ae58-db0c-34ee-3e5c-5dfc9b10a739
  • +
  • i-0b22a22eec53b9321
  • +
  • /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0
  • +
  • ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Network Security
  • +
+
instanceIdstring-The virtual machine instance ID on the cloud platformi-01234567890abcdef +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
interestedHoststringDomainNameThe endpoint hostname (For example, if an intranet host accesses a suspicious internet host, the intranet host is the "peerHost" and the internet host is the "interestedHost") +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • es-dtc-w-dc02.example.corp
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
interestedIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the interestedHost10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
+
isEntitystring-The current entity (or after change/modification) +
    +
  • {"key":"<example>","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"running","name":"state","value":"4"}]}
  • +
  • {"key":"<example>":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"stopped","name":"state","value":"1"}]}
  • +
  • {"key":"<example>","type":"File","attributes":[]}
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
isProxybool-Whether something is a proxyFalse +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
lastSeenreal-The last time the event was seen1656355418449 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
logonUserdynamicUserAccountThe logon user name +
    +
  • root
  • +
  • SISTEMA
  • +
  • oracle
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
majorVirusTypestring-The virus type +
    +
  • Virus
  • +
  • Suspicious Activity
  • +
  • Trojan
  • +
  • TROJ
  • +
+
+
    +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Mobile Security
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
  • File Security Storage
  • +
+
malFamilystring-The threat family +
    +
  • EQUATED
  • +
  • STARTER
  • +
  • 0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
malTypestring-The risk type for Network Content Correlation Engine rules +
    +
  • OTHERS
  • +
  • MALWARE
  • +
  • Others
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • File Security
  • +
  • Trend Vision One Container Security
  • +
+
mDeviceGUIDstring-The GUID of the agent host +
    +
  • C5B09EDD-C725-907F-29D9-B8C30D18C48F
  • +
  • C05B75AB-B518-BDD0-D2B5-E9CB631C539F
  • +
  • 9C28ACD3-D0EC-22A4-B08D-5B0BEFF501FC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
mitreVersionstring-The MITRE version +
    +
  • v9
  • +
  • v6
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
moduleScanTypestring-The module scan typetraditional +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
mpnamestring-The management product name +
    +
  • Cloud One - Workload Security
  • +
  • Apex Central
  • +
  • Deep Security Software
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
+
mpverstring-The product version +
    +
  • Microsoft-Windows-Security-Auditing
  • +
  • Level -- Medium security
  • +
  • TASK1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectAppNamestring-Name of the app involved in the AMSI event +
    +
  • Exchange Server 2016
  • +
  • PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.19041.1
  • +
  • PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.14393.0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectArtifactIdsdynamic-The artifact IDs generated by objectAction +
    +
  • 00000000-0000-0000-0000-000000000000_0.dmp
  • +
  • 11111111-1111-1111-1111-111111111111_2.bak
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectAttributesstring-The object attributesattribute +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectBmDatastring-The data of BM event +
    +
  • {"provider":"ORCA","schema_version":1,"data":[{"str":"Access /proc/<pid>/*"}]}
  • +
  • {"provider":"ORCA","schema_version":1,"data":[{"str":"source '/etc/profile.d/lang.sh'"}]}
  • +
  • {"provider":"ORCA","schema_version":1,"data":[{"str":"source '/etc/profile.d/bash_completion.sh'"}]}
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
objectCmddynamicCLICommandThe object process command line +
    +
  • C:\WINDOWS\system32\wbem\wmiprvse.exe -Embedding
  • +
  • "C:\WINDOWS\system32\WindowsPowerShell\v1.0\PowerShell.exe" -NoLogo -Noninteractive -NoProfile -ExecutionPolicy Bypass "& 'C:\WINDOWS\CCM\SystemTemp\afd6f0e5-e491-4764-a20a-9f1d9edf3cce.ps1'"
  • +
  • C:\WINDOWS\system32\lsass.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
objectCmdstringCLICommandCommand line entry of target process +
    +
  • wc -l
  • +
  • runc init
  • +
  • docker-init --version
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectContentNamestring-The AMSI object content name +
    +
  • C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.2\PowerShellGet.psd1
  • +
  • c:\synclog\BLAST_SCAN.vbs
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectCurrentFileSizelong-Previous size of modified object file +
    +
  • 59456
  • +
  • 60
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectCurrentPosixPermissionstring-The new POSIX permission file used in file events and CHMOD events1050180Trend Cloud One - Endpoint & Workload Security
objectFileAccessstring-The object file access details1717658631000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileCreationstring-The UTC time that the object was created +
    +
  • 2014-11-22T01:45:51-06:00
  • +
  • 2009-07-13T23:31:13-05:00
  • +
  • 2014-11-21T02:43:28-05:00
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileCreationstring-The time the object file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1648279273000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileGroupNamestring-The object file user group name +
    +
  • wheel
  • +
  • staff
  • +
  • admin
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashIdstring-The object file hash ID +
    +
  • 2141057820373638746
  • +
  • -6516669617381620295
  • +
  • -4912169863817247597
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashMd5stringFileMD5The MD5 of the object +
    +
  • 801E8003C257C8F540B20F1E0DECD3A6
  • +
  • CDA48FC75952AD12D99E526D0B6BF70A
  • +
  • D5120786925038601A77C2E1EB9A3A0A
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashMd5stringFileMD5The md5 hash of target process image or target file +
    +
  • 7ac47235c7bb452a03d3afd872f44c9e
  • +
  • c9873d83a969645a97f21adc1b164cc5
  • +
  • 3b32b378c8b288de6f15e1607a8c2145
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashSha1stringFileSHA1The SHA-1 of the objectFilePath object +
    +
  • 51B8646308EE0B68AD1F7F1291B85395434DE49A
  • +
  • 36C5D12033B2EAF251BAE61C00690FFB17FDDC87
  • +
  • 2586528000199793730B05D3F169BCF139E4D7A1
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashSha1stringFileSHA1The SHA1 hash of target process image or target file +
    +
  • ded3833f145989fd86c1f4811b61497298ebc7fd
  • +
  • c4fa06404142f1994431f9eef3df2cbe0f1998f1
  • +
  • 3c01d486ed5aa1ecc2d8f33dc24b0ed59b3e609e
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashSha256stringFileSHA2The SHA-256 of the object (objectFilePath) +
    +
  • A75C85F3B089993E9C042FB82ECB7757E8F460ED8065FC7991CAA38A6DE0F50C
  • +
  • 908B64B1971A979C7E3E8CE4621945CBA84854CB98D76367B791A6E22B5F6D53
  • +
  • 1A2ABAAD8A166B66CA35AB51C7432C5A7E46996472C8174281842896408D7F96
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashSha256stringFileSHA2The SHA256 hash of target process image or target file +
    +
  • 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8
  • +
  • 49fa3e206abf6a1f4546417dbe09f3f06b38847866a4a66de75bd90f39cb6c1c
  • +
  • 0969321ad5a0923f0f03896ad2c10e49290515c44b721d773942a37f62a24893
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileIsRemoteAccessbool-The remote access to the object file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileModifiedstring-The UTC time that the object was modified +
    +
  • 2024-10-10T10:10:10.0000000Z
  • +
  • 2024-11-11T11:11:11.0000000Z
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileModifiedTimestring-The time the object file was modified +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1648279273000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileNamestringFileNameThe object file name +
    +
  • powershell.exe
  • +
  • wmiprvse.exe
  • +
  • dismhost.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileOriginalNamestringFileNameThe original file name of the object image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileOwnerNamestring-The object file owner name +
    +
  • root
  • +
  • NT SERVICE\TrustedInstaller
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFilePathstringFileFullPathThe file path of the target process image or target file +
    +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • zwwritevirtualmemory
  • +
  • c:\windows\system32\wbem\wmiprvse.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
objectFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the target process image or target file +
    +
  • /usr/bin/bash
  • +
  • /bin/bash
  • +
  • /opt/folder1/probes/system/processes/processes
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileSizelong-The object file size +
    +
  • 0
  • +
  • 59456
  • +
  • 60
  • +
+
Trend Cloud One - Endpoint & Workload Security
objectFileSizestring-The file size of the object file +
    +
  • 59456
  • +
  • 60
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Data Detection and Response
  • +
+
objectFirstSeenstring-The first time the object was seen +
    +
  • 1656458063638
  • +
  • 1656260547165
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectHashIdlong-The object hash ID +
    +
  • 8576474808125313522
  • +
  • -599270888483415002
  • +
  • 2177864258235728980
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the domain10.10.10.10Trend Cloud One - Endpoint & Workload Security
objectIpsdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address list of internet event +
    +
  • ::1
  • +
  • 10.10.10.10
  • +
  • ::ffff:10.10.10.10
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLastSeenstring-The last time the object was seen +
    +
  • 1656458354730
  • +
  • 1656260580722
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLaunchTimestring-The object launch time of the Windows event +
    +
  • 1616412892557
  • +
  • 1620778597056
  • +
  • 1616414113105
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectNamestring-The base name of the object file or processnet.exe +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectNamestring-The object name +
    +
  • /usr/bin/bash
  • +
  • /bin/bash
  • +
  • /opt/folder1/probes/system/processes/processes
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectPidint-The object process PID +
    +
  • 17000
  • +
  • 22000
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
objectPidint-The PID of target process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectPosixPermissionstring-The current POSIX permission for the file1050112Trend Cloud One - Endpoint & Workload Security
objectPosixPermissionHashIdstring-The POSIX permission hash ID-8931783023607715387Trend Cloud One - Endpoint & Workload Security
objectProcessHashIdlong-FNV of target process +
    +
  • 1415699552492662761
  • +
  • -100650285065767982
  • +
  • -1139416698673814436
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRawDataSizedynamic-The raw data size of the Windows event object +
    +
  • 9
  • +
  • 1
  • +
  • 564
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRawDataStrdynamic-The data contents of the AMSI event +
    +
  • $global:?
  • +
  • 0
  • +
  • $servicename = "WinRM" +$arrService = Get-Service $servicename + +if ($arrService.Status -ne "Running") + +{ + + Restart-Service $servicename + + +} +
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryDatastringRegistryValueDataThe registry data contentsC:\Program Files\AlertMedia\AlertMedia Desktop Notifications\AlertMedia.exe +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRegistryDatastringRegistryValueDataThe registry value data +
    +
  • {11111111-1111-1111-1111-111111111111}
  • +
  • 1
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryKeyHandlestringRegistryKeyThe registry key path +
    +
  • HKCR\CID\{00000000-0000-0000-0000-000000000001}
  • +
  • HKLM\SOFTWARE\WOW6432Node\Eos
  • +
  • HKCU\SOFTWARE\Cerner\InstantAccess
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryKeyHandlestringRegistryKeyThe registry key +
    +
  • HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
  • +
  • HKLM\system\currentcontrolset\services\w32time\config
  • +
  • HKLM\system\currentcontrolset\services\tcpip\parameters
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryRootstring-The name of the object registry root key +
    +
  • HKCR
  • +
  • HKLM
  • +
  • HKCU
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRegistryRootint-The Windows Registry Root ID +
    +
  • 3
  • +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryValuestringRegistryValueThe registry value name +
    +
  • 1
  • +
  • key
  • +
  • reg
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRegistryValuestringRegistryValueRegistry value name +
    +
  • lastknowngoodtime
  • +
  • threadingmodel
  • +
  • epoch
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegTypeint-The Windows Registry Type ID +
    +
  • 1
  • +
  • 11
  • +
  • 4
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRunAsLocalAccountbool-The "runas" command uses a local account +
    +
  • 1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSessionIdstring-The object session ID +
    +
  • 0
  • +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSignerdynamic-Certificate signer of object process or file +
    +
  • Microsoft Windows
  • +
  • Software Signing;Apple Code Signing Certification Authority;Apple Root CA;
  • +
  • Microsoft Corporation
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSignerValiddynamic-Validity of certificate signer +
    +
  • 1
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSubTrueTypeint-File object's true sub-type +
    +
  • 5000
  • +
  • 18000
  • +
  • 28001
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectTrueTypeint-File object's true major type +
    +
  • 7
  • +
  • 5
  • +
  • 18
  • +
  • 4051
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectTypestring-The object type +
    +
  • file
  • +
  • process
  • +
  • qil
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • File Security
  • +
+
objectUserstringUserAccountThe owner name of the target process or the login user name +
    +
  • Système
  • +
  • SYSTEM
  • +
  • SISTEMA
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectUserstringUserAccountThe owner name of the target process or the login user name +
    +
  • root
  • +
  • SYSTEM
  • +
  • oracle
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
objectUserDomainstring-The owner domain of the target process +
    +
  • NT AUTHORITY
  • +
  • UNEB
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectUserDomainstring-The object user domain +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectUserGroupstring-The user group name +
    +
  • staff
  • +
  • _spotlight
  • +
  • wheel
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
oldFileHashstringFileSHA1The SHA-1 of the target process image or target file (wasEntity from an IM event) +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 57247B810B0EE61DD86CE24AC14097B9B5405EEC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
originalFileHashesdynamicFileSHA1The hashes of the original file +
    +
  • ba4700bfd55741c657a99fbe416787835fb384da
  • +
  • 639dfe4a69c1e6aace1e4eece3b3bb25af6a1392
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
originalFilePathsdynamic +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The paths of the original fileC:\\Users\\user_name\\Downloads\\run.exe +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
osDescriptionstring-The OS version +
    +
  • Windows 10 (64 bit)
  • +
  • Windows 10 Pro (64 bit) build 19044
  • +
  • Amazon Linux 2 (64 bit) (5.4.188-104.359.amzn2.x86_64)
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osNamestring-The host operating system name +
    +
  • Windows
  • +
  • Linux
  • +
  • macOS
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osTypestring-The host operating system type +
    +
  • 0x00000030
  • +
  • 4
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osVerstring-The version of the host operating system +
    +
  • Amazon Linux 2
  • +
  • 10.0.19044
  • +
  • 10.0.19042
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
outstring-The IP datagram length (in bytes) +
    +
  • 0
  • +
  • 439
  • +
  • 1314
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
parentCmdstringCLICommandThe command line entry of the parent process +
    +
  • C:\WINDOWS\system32\services.exe
  • +
  • C:\Windows\system32\services.exe
  • +
  • /sbin/launchd
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileCreationstring-The time the parent file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172968000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileGroupNamestring-The name of the parent file user group +
    +
  • wheel
  • +
  • admin
  • +
  • staff
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileHashIdlong-The parent file hash ID +
    +
  • -4092577940452904134
  • +
  • 2141057820373638746
  • +
  • -821808160829839906
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashMd5stringFileMD5The md5 hash of parent process +
    +
  • d8e577bf078c45954f4531885478d5a9
  • +
  • cd10cb894be2128fca0bf0e2b0c27c16
  • +
  • cfd65bed18a1fae631091c3a4c4dd533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashSha1stringFileSHA1The SHA1 hash of parent process +
    +
  • d7a213f3cfee2a8a191769eb33847953be51de54
  • +
  • 1f912d4bec338ef10b7c9f19976286f8acc4eb97
  • +
  • 9ad737cbd8bbdddc96726156dbd3bc03936bf02f
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashSha256stringFileSHA2The SHA256 hash of parent process +
    +
  • dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674
  • +
  • f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881
  • +
  • 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileModifiedTimestring-The time the parent file was modified +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172968000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileOriginalNamestringFileNameThe original file name of the parent image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileOwnerNamestring-The owner name of the parent file +
    +
  • root
  • +
  • cit
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the parent process +
    +
  • c:\windows\system32\services.exe
  • +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileSizestring-The file size of the parent file +
    +
  • 714856
  • +
  • 59952
  • +
  • 5114880
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentHashIdlong-The parent hash ID +
    +
  • -865367326691173681
  • +
  • -2903238741593506113
  • +
  • -4358168316031740439
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentLaunchTimereal-The time when the parent process was launched +
    +
  • 1653614773895
  • +
  • 1656118625928
  • +
  • 0
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentNamestring-The image name of the parent process +
    +
  • c:\windows\system32\services.exe
  • +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentPidint-The PID of the parent process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
parentPidint-The PID of the parent process +
    +
  • 1
  • +
  • 976
  • +
  • 920
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSessionIdint-The parent session ID- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSignerdynamic-The signer of the parent file +
    +
  • Microsoft Windows Publisher
  • +
  • Microsoft Windows
  • +
  • Software Signing;Apple Code Signing Certification Authority;Apple Root CA;
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSignerValiddynamic-The validity of the parent signer- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSubTrueTypeint-The true file subtype of the parent file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentTrueTypeint-The true file type of the parent file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentUserstring-The account name of the parent processAdministratorTrend Cloud One - Endpoint & Workload Security
parentUserstring-The type of user that executed the parent process +
    +
  • root
  • +
  • SYSTEM
  • +
  • SISTEMA
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentUserDomainstring-The domain name of the parent processbuiltindomainTrend Cloud One - Endpoint & Workload Security
parentUserDomainstring-The user domain of the parent process +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
plangint-The product language +
    +
  • 1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
platformAssetTagsdynamic-The list of platform custom asset tags{"Asset group":["finance"], "some.ip": ["10.1.0.1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
platformAssetTagsdynamic-The list of platform custom asset tags{"Asset group":["finance"], "some.ip": ["10.1.0.1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-Internal product ID (Deprecated, use productCode) +
    +
  • 2200
  • +
  • 751
  • +
  • 533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
policyIdstring-The policy ID of which the event was detected +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 007
  • +
  • 003
  • +
  • TM000001
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
pplatint-The product platform +
    +
  • 5889
  • +
  • 9217
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processArtifactIdsdynamic-The artifact IDs generated by processAction +
    +
  • 00000000-0000-0000-0000-000000000000_1.dmp
  • +
  • 11111111-1111-1111-1111-111111111111_2.bak
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processCmdstringCLICommandThe subject process command line +
    +
  • "C:\Program Files (x86)\AADM\AADM.exe"
  • +
  • /usr/lib/inet/sendmail -bl -q15m
  • +
  • ComDir
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
processCmdstringCLICommandThe command line entry of the subject process +
    +
  • C:\Windows\system32\lsass.exe
  • +
  • C:\WINDOWS\system32\lsass.exe
  • +
  • nimbus(processes)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileCreationstring-The Unix time of object creation +
    +
  • 1645828113585
  • +
  • 1655412594237
  • +
  • 1647162053219
  • +
+
Trend Cloud One - Endpoint & Workload Security
processFileCreationstring-The time the process file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172906000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileGroupNamestring-The name of the process file user group +
    +
  • wheel
  • +
  • admin
  • +
  • staff
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileHashIdlong-The file hash of the process +
    +
  • 2141057820373638746
  • +
  • -821808160829839906
  • +
  • 5222963427542927736
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashMd5stringFileMD5The MD5 of the subject process +
    +
  • D07ADD0CE6E000D3CD20193B891E8ED3
  • +
  • 1a9ba93ebe4cb60030831f8ce9e7d5f9
  • +
  • EEE6691B48D2FB604DDF0CBC90D75B0E
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
processFileHashMd5stringFileMD5The MD5 hash of the subject process image +
    +
  • cd10cb894be2128fca0bf0e2b0c27c16
  • +
  • 7ac47235c7bb452a03d3afd872f44c9e
  • +
  • cfd65bed18a1fae631091c3a4c4dd533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha1stringFileSHA1The SHA-1 of the subject process +
    +
  • C0885381EBAC94AB20E78936434FA208F6B65352
  • +
  • ac373ed32b491da22924e2e11e36574e5d582a35
  • +
  • DF93F7DF887E86C3B56539B5046B286001C6F150
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha1stringFileSHA1The SHA1 hash of subject process image +
    +
  • 1f912d4bec338ef10b7c9f19976286f8acc4eb97
  • +
  • ded3833f145989fd86c1f4811b61497298ebc7fd
  • +
  • 9ad737cbd8bbdddc96726156dbd3bc03936bf02f
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha256stringFileSHA2The SHA-256 of the subject process +
    +
  • 4314A869B8DAE1BD3FFF810B1366E90FB7C961D4A3424260692377FDD87361D2
  • +
  • 7824c45fc033696603fe97d8f193a1872dfb2b5db75f0cda21df27017b3cb623
  • +
  • 1A6D5986EFEAE89308D9EE11B4A7907012603392E0E66D0E529DB09DF1B4CB64
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
processFileHashSha256stringFileSHA2The SHA256 hash of subject process image +
    +
  • f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881
  • +
  • 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8
  • +
  • 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileModifiedTimestring-The time the process file was modified +
    +
  • 1652131848000
  • +
  • 1633413236462
  • +
  • 1414554708877
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileOriginalNamestringFileNameThe original file name of the process image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileOwnerNamestring-The process file owner name +
    +
  • root
  • +
  • cit
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFilePathstring +
    +
  • ProcessFullPath
  • +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the subject process +
    +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • c:\windows\syswow64\srts\wmipr.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
processFilePathstring +
    +
  • ProcessFullPath
  • +
  • ProcessName
  • +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the subject process +
    +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\lsass.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileSizestring-The file size of the process file +
    +
  • 59952
  • +
  • 59456
  • +
  • 47024
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processHashIdlong-The FNV of subject process +
    +
  • 7114696589795796819
  • +
  • 1307755369266815004
  • +
  • -5015325378148567246
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processImageFileNamesdynamic-The process image file names of detected backup artifacts +
    +
  • C:\Program Files\aaa\bbb\objprocess.exe
  • +
  • C:\Program Files\ccc\ddd\sample.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processImagePathstring-The process triggered by the file event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
processLaunchTimestring-The time the subject process was launched +
    +
  • 1656400286556
  • +
  • 1656566610259
  • +
  • 1656587180493
  • +
+
Trend Cloud One - Endpoint & Workload Security
processLaunchTimereal-The time the subject process was launched +
    +
  • 1653614775212
  • +
  • 1656118626642
  • +
  • 1652098160298
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\lsass.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processPidint-The PID of the subject process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
processPidint-The PID of the subject process +
    +
  • 4
  • +
  • 1
  • +
  • 784
  • +
  • 792
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processSignerdynamic-The signer name list of the subject process +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processSignerdynamic-The process file signer +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
  • Microsoft Corporation
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processSignerValiddynamic-The validity of the process signer +
    +
  • 1
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processSubTrueTypeint-The true file subtype of the process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processTrueTypeint-The true file type of the process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processUserstringUserAccountThe user name of the process or the file creator +
    +
  • SYSTEM
  • +
  • SVC_JENKINS_CODE_DEV
  • +
  • NETWORK SERVICE
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processUserstringUserAccountThe owner name of subject process image +
    +
  • root
  • +
  • SYSTEM
  • +
  • SISTEMA
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processUserDomainstring-The owner domain of the subject process image +
    +
  • NT AUTHORITY
  • +
  • DOMAINBA
  • +
  • PAEDMZ
  • +
+
Trend Cloud One - Endpoint & Workload Security
processUserDomainstring-The process user domain +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processUserGroupIdstring-The process user group ID or file creator +
    +
  • 0
  • +
  • S-1-5-1
  • +
+
Trend Cloud One - Endpoint & Workload Security
processUserGroupNamestring-The process user group name or file creator +
    +
  • root
  • +
  • NT AUTHORITY
  • +
+
Trend Cloud One - Endpoint & Workload Security
processUserIdstring-The process user ID or file creator +
    +
  • 0
  • +
  • S-1-5-1
  • +
+
Trend Cloud One - Endpoint & Workload Security
protostring-The exploited layer network protocol +
    +
  • 6
  • +
  • TCP
  • +
  • 17
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
protoint-The protocol type +
    +
  • TELEMETRY_CONNECTION_TCP
  • +
  • TELEMETRY_CONNECTION_UDP
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
protoFlagstring-The data flags +
    +
  • ACK PSH DF=1
  • +
  • ACK DF=1
  • +
  • DF=1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
pverstring-The product version +
    +
  • 1.2.0.2752
  • +
  • 1.0.345
  • +
  • 1.2.0.2657
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
quarantineFileIdstring-The unique identifier of the quarantined objectASLUMVS0.4FC +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineFilePathstringFileFullPathThe file path of the quarantined objectC:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineFileSha256stringFileSHA2The SHA-256 of the quarantined object84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
regionIdstring-The cloud asset region +
    +
  • US East (N. Virginia)
  • +
  • Europe (Frankfurt)
  • +
+
Trend Cloud One - Endpoint & Workload Security
regionIdstring-The cloud asset region +
    +
  • US East (N. Virginia)
  • +
  • Europe (Frankfurt)
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requestClientApplicationstring-The protocol user agent information +
    +
  • Microsoft-Delivery-Optimization/10.0
  • +
  • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
  • +
  • example Software GmbH
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
requestMethodstring-The network protocol request method +
    +
  • GET
  • +
  • POST
  • +
  • PUT
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
riskLevelstring-The risk level +
    +
  • 1
  • +
  • high
  • +
  • No Risk
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
rtDatestring-The date of the log generation1655337600000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtHourint-The hour of the log generation +
    +
  • 9
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtWeekDaystring-The weekday of the log generation +
    +
  • Monday
  • +
  • Tuesday
  • +
  • Friday
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
ruleIdint-The rule ID +
    +
  • 1002795
  • +
  • 1003802
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Network Security
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleSetNamestring-The rule set nameAllRules +
    +
  • Trend Vision One Container Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
ruleTypestring-The access rule type +
    +
  • udso
  • +
  • point of entry
  • +
  • unknown
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
ruleVerstring-The rule version +
    +
  • 202207060001
  • +
  • 202207190001
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
scoreint-The Web Reputation Services URL rating +
    +
  • 71
  • +
  • 81
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
secondActstring-The second scan action +
    +
  • Unknown
  • +
  • N/A
  • +
  • Deny Access
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
secondActResultstring-The result of the second scan action +
    +
  • Unknown
  • +
  • N/A
  • +
  • Access denied
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
senderGUIDstring-The sender GUID +
    +
  • 346648FC-9862-D2F0-F94C-FAB1A838ABD7
  • +
  • 36E5239E-EEBA-0100-C10E-C057E0455E1D
  • +
  • 9606BBD5-38A7-9024-83C8-9C88A2AF90CC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
sessionIdint-The session ID +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
shoststringDomainNameThe source hostname +
    +
  • dns.google
  • +
  • sw_us-east-1a_10-124-17-69
  • +
  • sw_us-east-1c_10-124-21-139
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Network Security
  • +
+
smacstring-The source MAC address +
    +
  • 00:11:22:33:44:55
  • +
  • 66:77:88:99:AA:BB
  • +
  • CC:DD:EE:FF:00:11
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
sprocstring-The OSSEC program name +
    +
  • postfix/sendmail
  • +
  • CRON
  • +
  • sshd
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
sptintPortThe source port number +
    +
  • 53
  • +
  • 5353
  • +
  • 443
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
srcFileCreationstring-The time the source file was created +
    +
  • 1577865600000
  • +
  • 1626201752000
  • +
  • 1626201750000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileGroupNamestring-The source file user group name +
    +
  • wheel
  • +
  • staff
  • +
  • NT SERVICE\TrustedInstaller
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileHashIdlong-The source file hash ID +
    +
  • 1102079405020678318
  • +
  • -6926286289273504319
  • +
  • 8528955148329941480
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileIsRemoteAccessbool-The remote access of the source file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileModifiedTimestring-The time the source file was modified +
    +
  • 1626201752000
  • +
  • 1626201750000
  • +
  • 1577865600000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileOwnerNamestring-The source file owner name +
    +
  • root
  • +
  • NT SERVICE\TrustedInstaller
  • +
  • NT AUTHORITY\SYSTEM
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The source file path +
    +
  • \\cnva-apps\megaclockprod\traveler\travelerprint.accdb
  • +
  • c:\program files\common files\microsoft shared\clicktorun\officesvcmgrschedule.xml
  • +
  • q:\a7_dbs\a4_pkg\a4_packaging.accde
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileSizestring-The file size of the source file +
    +
  • 0
  • +
  • 131072
  • +
  • 196608
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Data Detection and Response
  • +
+
srcFirstSeenstring-The first time the source file was seen +
    +
  • 0
  • +
  • 1656355418449
  • +
  • 1656714760440
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcHashIdlong-The source hash ID +
    +
  • 4070054759888344851
  • +
  • 2177864258235728980
  • +
  • 3476454206648023552
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcLastSeenstring-The last time the source file was seen +
    +
  • 0
  • +
  • 1656355418449
  • +
  • 1656715147313
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSubTrueTypeint-The true file subtype of the source file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcTrueTypeint-The true file type of the source file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
startTimelong-The time when the first event was received (in Unix milliseconds)1750983848000Trend Cloud One - Endpoint & Workload Security
statusstring-The HTTP response status code +
    +
  • 200
  • +
  • 500
  • +
  • 403
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
subRuleIdstring-ID of a subordinate rule +
    +
  • 85262
  • +
  • 914520
  • +
  • 18152
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
+
subRuleNamestring-The subrule name +
    +
  • Pre-authentication failed.
  • +
  • ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System Logs,File Deletion
  • +
  • ATTACK T1110: Multiple Windows Logon Failures
  • +
  • invisible_url_domain
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
tagsdynamic +
    +
  • Technique
  • +
  • Tactic
  • +
+
The detected technique ID based on the alert filter +
    +
  • MITREV9.T1090
  • +
  • MITRE.T1071
  • +
  • MITREV9.T1059.001
  • +
+
+
    +
  • ALL
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
targetstring-The target object for the behavior +
    +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • zwwritevirtualmemory
  • +
  • /proc/211296/exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
targetTypestring-The target object type +
    +
  • File System
  • +
  • Uncategorized
  • +
  • Exploit
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
timezonestring-The host time zone +
    +
  • UTC+00:00
  • +
  • UTC-05:00
  • +
  • UTC-03:00
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
triggerstring-The action trigger +
    +
  • ATSE
  • +
  • On-demand scan
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
triggerInfodynamic-The trigger information[{'triggerModule': 'ODS', 'triggerReason': 'System Schedule Scan'}] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
triggerReasonstring-The cause of the triggered action +
    +
  • FILEMETA.T1027.009.TRICKBOT.SMITRE1B2, T1027.009
  • +
  • ST002
  • +
  • Scheduled Scan (custom)
  • +
  • Scheduled Scan (system)
  • +
  • Remote Scan: the user triggered the Apex One agent from the Trend Vision One console
  • +
  • Manual Scan: the user triggered the local agent
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
urlCatdynamic-The requested URL category +
    +
  • Untested
  • +
  • 158
  • +
  • Web Advertisement
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
userDomaindynamic-The user domain name +
    +
  • CORP
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
vpcIdstring-The virtual private cloud that contains the cloud asset +
    +
  • vpc-01234567890abcdef
  • +
  • avtd-vnet-ozyww04h
  • +
  • ocid1.vnic.oc1.iad.abuwcljs4szq5rylkxikcthyegnqn5mjhkyn3xwtoa3uvbonxqn52nofibgq
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
vpcIdstring-The virtual private cloud that contains the cloud assetvpc-01234567890abcdef +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
wasEntitystring-The entity before change/modification +
    +
  • {"key":"<example>","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"stopped","name":"state","value":"1"}]}
  • +
  • {"key":"<example>","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"running","name":"state","value":"4"}]}
  • +
  • {"key":"<example>","type":"File","attributes":[]}
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
winEventIdint-The Windows Event ID +
    +
  • 11
  • +
  • 4624
  • +
  • 4670
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 299 +- **Layer:** Endpoint +- **Product:** Trend Cloud One - Endpoint & Workload Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Endpoint/Trend Micro Apex One On-Premises.md b/pages/Endpoint/Trend Micro Apex One On-Premises.md new file mode 100644 index 0000000..c48b3b0 --- /dev/null +++ b/pages/Endpoint/Trend Micro Apex One On-Premises.md @@ -0,0 +1,399 @@ +--- +layout: default +title: Trend Micro Apex One On-Premises - Endpoint +--- + +# Trend Micro Apex One On-Premises +**Layer:** Endpoint + +This documentation provides detailed information about all fields available for Trend Micro Apex One On-Premises. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
detectionMetadynamic-The descriptions of the detected techniques['T1204 some description about this technique', 'T1573.001_AES another description about this technique'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
detectionNamesdynamic-The rules that triggered the event['HS_EMOTET.SMAA', 'HM_AVEDOWN.SMZTIG-A', 'HE_DOCQRPHISH.SM'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
objectSignerFlagsAdhocdynamic-The list of object process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
objectSignerFlagsLibValiddynamic-The list of object process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
objectSignerFlagsRuntimedynamic-The list of object process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsAdhocdynamic-The list of parent process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsLibValiddynamic-The list of parent process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsRuntimedynamic-The list of parent process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsAdhocdynamic-The list of process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsLibValiddynamic-The list of process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsRuntimedynamic-The list of process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
quarantineFileIdstring-The unique identifier of the quarantined objectASLUMVS0.4FC +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineFilePathstringFileFullPathThe file path of the quarantined objectC:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineFileSha256stringFileSHA2The SHA-256 of the quarantined object84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 14 +- **Layer:** Endpoint +- **Product:** Trend Micro Apex One On-Premises + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Endpoint/Trend Micro Apex One as a Service.md b/pages/Endpoint/Trend Micro Apex One as a Service.md new file mode 100644 index 0000000..3ea329c --- /dev/null +++ b/pages/Endpoint/Trend Micro Apex One as a Service.md @@ -0,0 +1,8361 @@ +--- +layout: default +title: Trend Micro Apex One as a Service - Endpoint +--- + +# Trend Micro Apex One as a Service +**Layer:** Endpoint + +This documentation provides detailed information about all fields available for Trend Micro Apex One as a Service. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
accessPermissionstring-The access permission type +
    +
  • Modify
  • +
  • Read and execute
  • +
  • List device content only
  • +
  • Block
  • +
+
Trend Micro Apex One as a Service
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
actResultdynamic-The result of an action +
    +
  • Dropped
  • +
  • Successful
  • +
  • Accepted
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • Mobile Security
  • +
+
additionalInfostring-The filter rule infoDefault +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
applicationstring-The name of the requested application +
    +
  • HyperText Transfer Protocol
  • +
  • DoubleClick
  • +
  • The Secure HyperText Transfer Protocol
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Apex One as a Service
  • +
+
authIdstring-The authorization ID +
    +
  • 999
  • +
  • 996
  • +
  • 997
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
behaviorCatstring-The matched policy category +
    +
  • Policy Enforcement
  • +
  • Grey-Detection
  • +
  • Threat-Detection
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
blockingstring-The blocking type +
    +
  • Web reputation
  • +
  • Web Server
  • +
+
Trend Micro Apex One as a Service
bmGroupstring-The one-to-many data structurelogGenLocalDatetime:2022-07-08T09:21:11+00:00, act:Assessment, behaviorType:Registry, riskConfidenceLevel:1, ruleId:7, ruleName:New Service, behaviorCategory:Policy Enforcement, processFilePath:C:\Windows\SysWOW64\srts\wmipr.exe, aegisOperation:Set Key, objectFilePath:HKLM\SYSTEM\CurrentControlSet\Services\DpsiBSvc\Start, policyId:007, objectFileHashSha1:null, objectCmd:null, processFileHashSha1:null, processCmd:null, objectRegistryData:null, objectRegistryKeyHandle:null, objectRegistryValue:nullTrend Micro Apex One as a Service
catint-The weighted priority of the incident +
    +
  • 100
  • +
  • 200
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
cccaDetectionstring-Is this log identified as a C&C callback address detectionYes +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDetectionSourcestring-Which list defines this CCCA detection rule +
    +
  • CCCA_GLOBAL_LIST (0)
  • +
  • GLOBAL_INTELLIGENCE
  • +
  • USER_DEFINED
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaRiskLevelint-The severity level of the threat actors associated with the C&C servers +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
censusMaturityValueint-The CENSUS maturity value +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
censusPrevalenceValueint-The CENSUS prevalence value +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
channelstring-The channel through which the demanded WinEvent is delivered +
    +
  • Local file or network drive
  • +
  • Local file
  • +
+
Trend Micro Apex One as a Service
channelstring-The Windows event channel +
    +
  • Security
  • +
  • Microsoft-Windows-WMI-Activity/Trace
  • +
  • Microsoft-Windows-TaskScheduler/Operational
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
clientStatusstring-The client status when the event occurred +
    +
  • Rebuilding database
  • +
  • Online
  • +
  • Offline
  • +
+
Trend Micro Apex One as a Service
compressedFileHashstringFileSHA1The SHA-1 of the decompressed archive +
    +
  • 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA
  • +
  • FA71B59F35F0EE44D27F74917EF5A0DA2797E80B
  • +
  • 14D2302172EB81465CE12E01361AE24CDE170F7B
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileHashSha256stringFileSHA2The SHA-256 of the compressed suspicious file +
    +
  • 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F
  • +
  • 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE
  • +
  • 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileNamestringFileNameThe file name of the compressed file +
    +
  • /proc/32058/fd/150
  • +
  • NONAMEFL
  • +
  • /proc/10006/fd/30
  • +
  • VirusActionSample/RPF2_OtherMalwareSample-other.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
computerDomainstring-The computer domain +
    +
  • COMCEL_DOMINIO
  • +
  • HDWA
  • +
  • RANDON
  • +
+
Trend Micro Apex One as a Service
confidenceint-The confidence rating returned from TrendX Hybrid Model (predictive machine learning). Values from 1-99.94 +
    +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
correlationDatadynamic-The data for correlation- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
customAssetTagsdynamic-The list of custom asset tags{"os":["linux", "windows"], "org":["bu1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
customAssetTagsdynamic-The list of custom asset tags{"os":["linux", "windows"], "org":["bu1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
dacDeviceTypestring-The device type +
    +
  • USB storage device
  • +
  • Mobile devices
  • +
  • Floppy disks
  • +
  • Network driver
  • +
+
Trend Micro Apex One as a Service
dceArtifactActionsdynamic-The actions performed on Damage Cleanup Engine artifacts +
    +
  • folder_backup
  • +
  • objproc_dump
  • +
  • subproc_dump
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
destinationPathstring-The intended destination of the file containing the digital asset or channel +
    +
  • Cloud Storage (OneDrive)
  • +
  • Printer
  • +
  • example.sharepoint.com/personal/page_path/onedrive.aspx
  • +
+
Trend Micro Apex One as a Service
detailTraceint-Whether the detection comes with a detailed trace footprint-Trend Micro Apex One as a Service
detectedActionsdynamic-The actions performed on detected artifacts +
    +
  • folder_backup
  • +
  • objproc_dump
  • +
  • subproc_dump
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectedBackupArtifactsdynamic-The information about detected artifacts{"objectArtifactId": "025d9f2a-ac9c-4cdf-b9e4-cf20c6e40281_0.dmp", "action": "object_process_dump", "status": 0, "processCreationTime": "1627574338077", "processImageFileName": "C:\Program Files\aaa\bbb\objprocess.exe"} +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectedBackupArtifactsStatusdynamic-The backup status of detected artifacts['0', '-67'] +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectedBackupFolderstring-The folder path for detected backup foldersC:\\Program Files (x86)\\Trend Micro\\artifact\\DCE +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
detectedPatternstring-The detected patterndct.virus +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectionAggregationIdsdynamic-The list of detection aggregation IDs['11111111-1111-1111-1111-111111111111'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
detectionAggressivenessLevelint-The detection aggressiveness level +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
  • 4
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
detectionEngineVersionstring-The detection engine version7.6.0 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectionMetadynamic-The descriptions of the detected techniques['T1204 some description about this technique', 'T1573.001_AES another description about this technique'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
detectionNamestring-The general name for the detection +
    +
  • Troj.Win32.TRX.XXPE50F13017
  • +
  • Troj.Win32.TRX.XXPE50FFF059
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Security
  • +
+
detectionNamesdynamic-The rules that triggered the event['HS_EMOTET.SMAA', 'HM_AVEDOWN.SMZTIG-A', 'HE_DOCQRPHISH.SM'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
deviceGUIDstring-The GUID of the agent which reported the detection +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
deviceModelstring-The device model numberc96aTrend Micro Apex One as a Service
deviceSerialstring-The device serial ID000000063a2e8fTrend Micro Apex One as a Service
directionstring-The direction +
    +
  • Incoming
  • +
  • Outgoing
  • +
  • Unknown
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
+
dmacstring-The MAC address of the destination IP (dest_ip) +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
domainNamestringDomainNameThe detected domain name +
    +
  • http://10.10.10.10
  • +
  • example.domain.com
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dptintPortThe destination port number- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dststring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
duserdynamicEmailRecipientThe email recipient +
    +
  • (no user)
  • +
  • SYSTEM
  • +
  • SYSTEM
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
dvchoststring-The computer which installed the Trend Micro product +
    +
  • CU-PRO1-9039-2
  • +
  • LTPF32PMNN
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointGuidstringEndpointIDHost GUID of the endpoint on which the event was detected11111111-1111-1111-1111-111111111111 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe host name of the endpoint on which the event was detected +
    +
  • PHILIPSIBE09
  • +
  • WHAM6WK8XG2
  • +
  • MacBook-Pro-del-Meno
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the endpoint on which the event was detected10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address of the endpoint on which the event was detected +
    +
  • 10.10.10.10
  • +
  • ::1
  • +
  • fe80::1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
endpointMacAddressstring-The MAC address of endpoint +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
+
endpointMacAddressdynamic-The host MAC address +
    +
  • 0-0-0-0-0-0-0-e0
  • +
  • 00:00:00:ff:ff:ff
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
engineOperationstring-The operation of the engine event +
    +
  • Set Key
  • +
  • Invoke API
  • +
  • Create
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
engTypestring-The engine type +
    +
  • Virus Scan Engine (Windows XP/Server 2003, x64)
  • +
  • Virus Scan NT Kernel Engine
  • +
  • Spyware/Grayware Scan Engine v.6 (64-bit)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
engVerstring-The engine version +
    +
  • 1.0.0.1123_1.0.0.1101
  • +
  • 9.0.1004
  • +
  • 22.540.1001
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
eventDataAccessListstring-The list of requested access rights +
    +
  • %%4416
  • +
  • %%4417
  • +
  • %%4418
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataAccessMaskstring-The hexadecimal value of the requested or used permissions during an access attempt +
    +
  • 16
  • +
  • 2147483648
  • +
  • 1048576
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataActionNamestring-The action performed +
    +
  • Language Components Installer
  • +
  • Group Policy Background Processing
  • +
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
eventDataAuthenticationPackageNamestring-The authentication package name of the Windows event data +
    +
  • NTLM
  • +
  • Negotiate
  • +
  • MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataElevatedTokenstring-Whether the session is elevated and has administrator privileges +
    +
  • %%1842
  • +
  • %%1843
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataFullyQualifiedAssemblyNamestring-The fully qualified .NET assembly name +
    +
  • System.Runtime, Version=6.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
  • +
  • System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
  • +
  • System.Diagnostics.Process, Version=8.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataImpersonationLevelstring-The sign-in session impersonation level +
    +
  • %%1830
  • +
  • %%1832
  • +
  • %%1833
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataIpAddressstring-The IP address for Windows event 4624 which is "An account was successfully logged on" +
    +
  • -
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataJobOwnerstring-The name of the account that initiated the event +
    +
  • BEI\holdej
  • +
  • NT AUTHORITY\SYSTEM
  • +
+
Trend Micro Apex One as a Service
eventDataLogonProcessNamestring-The name of the Windows event sign in process name +
    +
  • NtLmSsp
  • +
  • Advapi
  • +
  • Advapi
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataLogonTypestring-The logon type for Windows event 4624 which is "An account was successfully logged on" +
    +
  • 3
  • +
  • 5
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataModuleILPathstring-The CIL image path of the module or the dynamic module name +
    +
  • C:\Program Files\Cymulate\Agent\System.Threading.dll
  • +
  • C:\windows\system32\tzsync.exe
  • +
  • C:\Program.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataObjectNamestring-The identifying information about the object for which access was requested +
    +
  • \Device\HarddiskVolume2\Windows\System32\lsass.exe
  • +
  • C:\Windows\System32\osk.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataObjectTypestring-The object type +
    +
  • Process
  • +
  • File
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataOperationstring-Windows event 11 +
    +
  • Start IWbemServices::ExecQuery - root\ccm : select * from SMS_Authority
  • +
  • Start IWbemServices::ExecQuery - root\cimv2 : select * from win32_process
  • +
  • Start IWbemServices::ExecQuery - root\ccm : SELECT * FROM SMS_Authority
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataPathstring-The path of the Windows event data +
    +
  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\officesvcmgr.exe
  • +
  • taskhostw.exe
  • +
  • gpupdate.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataProcessPathstring-The process path that initiated the event +
    +
  • C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE
  • +
  • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
  • +
  • C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
  • +
+
Trend Micro Apex One as a Service
eventDataScriptBlockTextstring-Windows event 4104, Creating Scriptblock text +
    +
  • $global:?
  • +
  • 0
  • +
  • { Set-StrictMode -Version 1; $_.PSMessageDetails }
  • +
+
Trend Micro Apex One as a Service
eventDataStatusstring-The Windows event data status +
    +
  • 0xc000006d
  • +
  • -1073741715
  • +
  • 0xc000006e
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataSubjectUserNamestring-The account name +
    +
  • dadmin
  • +
  • Alex
  • +
  • london$
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataSubStatusstring-The Windows event data sub status +
    +
  • 0xc0000064
  • +
  • 0xc000006a
  • +
  • -1073741724
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTargetDomainNamestring-The target sign-in account domain or computer name +
    +
  • NT AUTHORITY
  • +
  • Builtin
  • +
  • SHOCKWAVE
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTargetNamestring-The service, application, or network resource name +
    +
  • Microsoft_RssPlatform_*
  • +
  • WindowsLive:target=virtualapp/didlogical
  • +
  • MicrosoftOffice*
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTargetUserNamestring-The user name of the Windows event data target +
    +
  • Offer Remote Assistance Helpers
  • +
  • Administrators
  • +
  • Administradores
  • +
+
Trend Micro Apex One as a Service
eventDataTaskNamestring-The task name logged by the Windows event +
    +
  • \Microsoft\Windows\LanguageComponentsInstaller\Installation
  • +
  • \Microsoft\Office\Office Serviceability Manager
  • +
  • \MicrosoftEdgeUpdateTaskMachineUA
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTicketEncryptionTypestring-The cryptographic suite used for the Kerberos TGS +
    +
  • 0x12
  • +
  • 0x17
  • +
  • 0x18
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataTicketOptionsstring-The authentication request Kerberos ticket behavior and permissions flags +
    +
  • 0x40810000
  • +
  • 0x40810010
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataUserContextstring-The user context of the Windows event data +
    +
  • MP\MPBSA179345$
  • +
  • MP\MPBSASPU179370$
  • +
  • MP\MPBSA4025625$
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventDataWorkstationNamestring-The name of the computer used in the sign-in attempt +
    +
  • WIN-GG82ULGC9GO
  • +
  • DESKTOP-123ABC
  • +
  • CLIENT01
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventHashIdstring-The event hash ID +
    +
  • -8406473586387535914
  • +
  • 138486453338666581
  • +
  • -7909265752378976284
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdint-Event type- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventMessagestring-The event message[0x13bb4e2a0] activating connection: mach=true listener=false peer=false name=com.apple.airportd +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubIdint-The access type +
    +
  • 2 - TELEMETRY_PROCESS_CREATE
  • +
  • 101 - TELEMETRY_FILE_CREATE
  • +
  • 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
eventSubNamestring-The event type sub-name +
    +
  • IPS Detection
  • +
  • Personal Firewall
  • +
  • Attack Discovery
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
eventTimereal-The time the agent detected the event1657781088000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
extraInfodynamic-The network application name +
    +
  • N/A
  • +
  • Web Client Common
  • +
  • DCERPC Services
  • +
+
Trend Micro Apex One as a Service
fileCreationstring-The file creation date1595918517000Trend Micro Apex One as a Service
fileDescstring-The file description +
    +
  • Atualiza PJRO
  • +
  • Carpeta de archivos
  • +
  • 7z Setup SFX (x86)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
filePathstringFileFullPathThe file path without the file name +
    +
  • security
  • +
  • /var/log/audit/audit.log
  • +
  • application
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
fileSizestring-The file size of the suspicious file +
    +
  • 0
  • +
  • 1255856
  • +
  • 1237880
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileVerstring-The file version +
    +
  • 10.0.19041.1
  • +
  • 10.0.19041.1766
  • +
  • 10.0.18362.1
  • +
+
Trend Micro Apex One as a Service
filterNamestring-The filter name +
    +
  • ConnectionFilter
  • +
  • Virtual Analyzer
  • +
  • Data Loss Prevention
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
+
filterTypestring-The filter type +
    +
  • Spam filter
  • +
  • Size filter
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
+
firstActstring-The first scan action +
    +
  • Pass
  • +
  • Quarantine
  • +
  • Clean
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
firstActResultstring-The first scan action result +
    +
  • File passed
  • +
  • Unable to quarantine file
  • +
  • File quarantined
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
firstSeenreal-The first time the event was seen1656355418449 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
forensicFileHashstring-The hash value of the forensic data file +
    +
  • 177844c5927d0f20da06d79d986c7e7f8c7a3b6a
  • +
  • da39a3ee5e6b4b0d3255bfef95601890afd80709
  • +
  • 8dab234ab6cd96301f9452994f015a449d629edd
  • +
+
Trend Micro Apex One as a Service
forensicFilePathstring-The file path of the forensic file (When a Data Loss Prevention policy is triggered, the file is encrypted and copied to the OfficeScan server for post-mortem analysis) +
    +
  • C:\Program Files (x86)\Trend Micro\OfficeScan Client\dlplite\forensic\frnsc_200411DC0594_xml_00000000000_20220314_132326281
  • +
  • C:\Program Files (x86)\Trend Micro\OfficeScan Client\dlplite\forensic\frnsc_CIL-OPRCOGEN_docx_00000000000_20211025_225445873
  • +
  • C:\Program Files (x86)\Trend Micro\OfficeScan Client\dlplite\forensic\frnsc_SHA-ESHOU_h265_00000000000_20220601_082417865
  • +
+
Trend Micro Apex One as a Service
ftpUserstring-The FTP login user name +
    +
  • USER\TREND
  • +
  • User
  • +
  • ftpuser_service
  • +
+
Trend Micro Apex One as a Service
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
hookIdstring-The hook ID +
    +
  • -1
  • +
  • 5
  • +
  • 4
  • +
+
Trend Micro Apex One as a Service
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The domain name +
    +
  • localhost
  • +
  • wpad
  • +
  • settings-win.data.microsoft.com
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
httpRefererstringURLThe HTTP referer +
    +
  • http://172.16.58.233/
  • +
  • http://example/page1/
  • +
  • https://www.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
httpRefererstringURLThe HTTP header referer +
    +
  • http://10.10.10.10/
  • +
  • http://fake/home/
  • +
  • http://fake.com/page/Test.jsp
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
instanceIdstring-The ID of the instance that indicates the meta-cloud or data center VM +
    +
  • 52294e7b-f732-c6e9-b2c3-7a6b6f50d101
  • +
  • 00030912-c5e7-4348-9012-7c684751c531
  • +
  • 0008ae58-db0c-34ee-3e5c-5dfc9b10a739
  • +
  • i-0b22a22eec53b9321
  • +
  • /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0
  • +
  • ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Network Security
  • +
+
integrityLevelint-The integrity level of a process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
interestedHoststringDomainNameThe endpoint hostname (For example, if an intranet host accesses a suspicious internet host, the intranet host is the "peerHost" and the internet host is the "interestedHost") +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • es-dtc-w-dc02.example.corp
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
interestedIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the interestedHost10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
+
interestedMacAddressstring-The MAC address identified as the log owner's +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
+
isHiddenstring-Whether the detection log generated a grey rule matchYes +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
isProxybool-Whether something is a proxyFalse +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
lastSeenreal-The last time the event was seen1656355418449 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
logonUserdynamicUserAccountThe logon user name +
    +
  • root
  • +
  • SISTEMA
  • +
  • oracle
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
mailDeliveryTimestring-The mail delivery time1900-1-1 00:00:00Trend Micro Apex One as a Service
mailMsgSubjectstringEmailSubjectThe email subject +
    +
  • FW. mail subject
  • +
  • ManageEngine
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
malDststring-The malware infection destination +
    +
  • 3334_02W3P7
  • +
  • 2666_02N413
  • +
  • 3334_02NHEL
  • +
+
Trend Micro Apex One as a Service
malFamilystring-The threat family +
    +
  • EQUATED
  • +
  • STARTER
  • +
  • 0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
malSrcstringFileFullPathThe malware infection source +
    +
  • \\10.172.1.33\kortiz
  • +
  • \\10.240.0.148\wbind
  • +
  • \\10.240.1.69\MT26933059
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Network Security
  • +
+
malSubTypestring-The subsidiary virus typeUnknown +
    +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
+
malTypestring-The risk type for Network Content Correlation Engine rules +
    +
  • OTHERS
  • +
  • MALWARE
  • +
  • Others
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • File Security
  • +
  • Trend Vision One Container Security
  • +
+
matchedContentdynamic-The one-to-many data structure +
    +
  • ['matchedContentEx:client_id=00000000-0000-0000-0000-000000000000&redirect_uri=https://example.page.com, matchedInfo:0,6|0,6']
  • +
  • ['matchedContentEx:example string, matchedInfo:0,6']
  • +
+
Trend Micro Apex One as a Service
mDevicedynamic-IP of the source +
    +
  • 10.10.10.10
  • +
  • fe80::1234:5678:9abc:def0
  • +
+
Trend Micro Apex One as a Service
mDeviceGUIDstring-The GUID of the agent host +
    +
  • C5B09EDD-C725-907F-29D9-B8C30D18C48F
  • +
  • C05B75AB-B518-BDD0-D2B5-E9CB631C539F
  • +
  • 9C28ACD3-D0EC-22A4-B08D-5B0BEFF501FC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
messageTypestring-The message typeDefault +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
moduleNamestring-The module where a hook procedure was set up +
    +
  • c:\program files (x86)\desktopcentral_agent\bin\dcusbsummary.exe
  • +
  • c:\program files\common files\microsoft shared\clicktorun\officesvcmgr.exe
  • +
  • c:\program files (x86)\sharp\sharp pen software\prsnspttool.exe
  • +
+
Trend Micro Apex One as a Service
moduleScanTypestring-The module scan typetraditional +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
mpnamestring-The management product name +
    +
  • Cloud One - Workload Security
  • +
  • Apex Central
  • +
  • Deep Security Software
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
+
mpverstring-The product version +
    +
  • Microsoft-Windows-Security-Auditing
  • +
  • Level -- Medium security
  • +
  • TASK1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
msgActstring-The message action +
    +
  • Quarantine
  • +
  • Deliver
  • +
+
Trend Micro Apex One as a Service
msgIdstringEmailMessageIDThe internet message ID +
    +
  • 66.6.00.0006
  • +
  • example.test.com
  • +
  • dameware1svr
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
objectAppNamestring-Name of the app involved in the AMSI event +
    +
  • Exchange Server 2016
  • +
  • PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.19041.1
  • +
  • PowerShell_C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe_10.0.14393.0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectArtifactIdsdynamic-The artifact IDs generated by objectAction +
    +
  • 00000000-0000-0000-0000-000000000000_0.dmp
  • +
  • 11111111-1111-1111-1111-111111111111_2.bak
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectAttributesstring-The object attributesattribute +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectAuthIdstring-The object authorization ID +
    +
  • 999
  • +
  • 996
  • +
  • 997
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectCmddynamicCLICommandThe object process command line +
    +
  • C:\WINDOWS\system32\wbem\wmiprvse.exe -Embedding
  • +
  • "C:\WINDOWS\system32\WindowsPowerShell\v1.0\PowerShell.exe" -NoLogo -Noninteractive -NoProfile -ExecutionPolicy Bypass "& 'C:\WINDOWS\CCM\SystemTemp\afd6f0e5-e491-4764-a20a-9f1d9edf3cce.ps1'"
  • +
  • C:\WINDOWS\system32\lsass.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
objectCmdstringCLICommandCommand line entry of target process +
    +
  • wc -l
  • +
  • runc init
  • +
  • docker-init --version
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectContentNamestring-The AMSI object content name +
    +
  • C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.2\PowerShellGet.psd1
  • +
  • c:\synclog\BLAST_SCAN.vbs
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectCurrentFileSizelong-Previous size of modified object file +
    +
  • 59456
  • +
  • 60
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectEntityNamestring-The object entity name +
    +
  • any_process
  • +
  • exe_file
  • +
  • powershell
  • +
+
Trend Micro Apex One as a Service
objectFileAccessstring-The object file access details1717658631000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileCreationstring-The UTC time that the object was created +
    +
  • 2014-11-22T01:45:51-06:00
  • +
  • 2009-07-13T23:31:13-05:00
  • +
  • 2014-11-21T02:43:28-05:00
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileCreationstring-The time the object file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1648279273000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileCurrentOwnerNamestring-The current owner name of the object file +
    +
  • NT AUTHORITY\SYSTEM
  • +
  • BUILTIN\Administrators
  • +
  • BUILTIN\Administradores
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileCurrentOwnerSidstring-The current security identifier owner of the object file +
    +
  • S-1-5-18
  • +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileDaclStringstring-The discretionary access control list of the object file +
    +
  • D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;OICI;GA;;;SY)(A;OICI;0xa0120000;;;WD)(A;OICI;GA;;;BA)
  • +
  • D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;AC)(A;ID;0x1200a9;;;S-1-15-2-2)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileExtendedAttributestring-The extended attributes of the file +
    +
  • com.apple.quarantine
  • +
  • com.apple.metadata:kMDItemWhereFroms
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileGroupNamestring-The object file user group name +
    +
  • wheel
  • +
  • staff
  • +
  • admin
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileGroupSidstring-The security identifier of the object file group +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-21-397955417-626881126-188441444-513
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashIdstring-The object file hash ID +
    +
  • 2141057820373638746
  • +
  • -6516669617381620295
  • +
  • -4912169863817247597
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashMd5stringFileMD5The MD5 of the object +
    +
  • 801E8003C257C8F540B20F1E0DECD3A6
  • +
  • CDA48FC75952AD12D99E526D0B6BF70A
  • +
  • D5120786925038601A77C2E1EB9A3A0A
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashMd5stringFileMD5The md5 hash of target process image or target file +
    +
  • 7ac47235c7bb452a03d3afd872f44c9e
  • +
  • c9873d83a969645a97f21adc1b164cc5
  • +
  • 3b32b378c8b288de6f15e1607a8c2145
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashSha1stringFileSHA1The SHA-1 of the objectFilePath object +
    +
  • 51B8646308EE0B68AD1F7F1291B85395434DE49A
  • +
  • 36C5D12033B2EAF251BAE61C00690FFB17FDDC87
  • +
  • 2586528000199793730B05D3F169BCF139E4D7A1
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashSha1stringFileSHA1The SHA1 hash of target process image or target file +
    +
  • ded3833f145989fd86c1f4811b61497298ebc7fd
  • +
  • c4fa06404142f1994431f9eef3df2cbe0f1998f1
  • +
  • 3c01d486ed5aa1ecc2d8f33dc24b0ed59b3e609e
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileHashSha256stringFileSHA2The SHA-256 of the object (objectFilePath) +
    +
  • A75C85F3B089993E9C042FB82ECB7757E8F460ED8065FC7991CAA38A6DE0F50C
  • +
  • 908B64B1971A979C7E3E8CE4621945CBA84854CB98D76367B791A6E22B5F6D53
  • +
  • 1A2ABAAD8A166B66CA35AB51C7432C5A7E46996472C8174281842896408D7F96
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileHashSha256stringFileSHA2The SHA256 hash of target process image or target file +
    +
  • 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8
  • +
  • 49fa3e206abf6a1f4546417dbe09f3f06b38847866a4a66de75bd90f39cb6c1c
  • +
  • 0969321ad5a0923f0f03896ad2c10e49290515c44b721d773942a37f62a24893
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileIsRemoteAccessbool-The remote access to the object file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileModifiedstring-The UTC time that the object was modified +
    +
  • 2024-10-10T10:10:10.0000000Z
  • +
  • 2024-11-11T11:11:11.0000000Z
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileModifiedTimestring-The time the object file was modified +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1648279273000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileNamestringFileNameThe object file name +
    +
  • powershell.exe
  • +
  • wmiprvse.exe
  • +
  • dismhost.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileOriginalNamestringFileNameThe original file name of the object image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileOwnerNamestring-The object file owner name +
    +
  • root
  • +
  • NT SERVICE\TrustedInstaller
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectFileOwnerSidstring-The security identifier of the object file owner +
    +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFilePathstringFileFullPathThe file path of the target process image or target file +
    +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • zwwritevirtualmemory
  • +
  • c:\windows\system32\wbem\wmiprvse.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Vision One Container Security
  • +
+
objectFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the target process image or target file +
    +
  • /usr/bin/bash
  • +
  • /bin/bash
  • +
  • /opt/folder1/probes/system/processes/processes
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileRemoteAccessbool-The remote access for the object file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectFileSaclStringstring-The system access control list of the object file +
    +
  • S:NO_ACCESS_CONTROL
  • +
  • S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  • +
  • S:(AU;SAFA;0x1f0116;;;WD)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectFileSizestring-The file size of the object file +
    +
  • 59456
  • +
  • 60
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Data Detection and Response
  • +
+
objectFirstRecordedstring-The first time that the object appeared-Trend Micro Apex One as a Service
objectFirstSeenstring-The first time the object was seen +
    +
  • 1656458063638
  • +
  • 1656260547165
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectHashIdlong-The object hash ID +
    +
  • 8576474808125313522
  • +
  • -599270888483415002
  • +
  • 2177864258235728980
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectHostNamestringDomainNameServer name where Internet event was detected +
    +
  • 10.10.10.10
  • +
  • sample.test.org
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectIdstring-The UUID of the object +
    +
  • 3
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
objectIntegrityLevelint-Integrity level of target process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address of internet event10.10.10.10 +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectIpsdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address list of internet event +
    +
  • ::1
  • +
  • 10.10.10.10
  • +
  • ::ffff:10.10.10.10
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLastSeenstring-The last time the object was seen +
    +
  • 1656458354730
  • +
  • 1656260580722
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLaunchTimestring-The object launch time of the Windows event +
    +
  • 1616412892557
  • +
  • 1620778597056
  • +
  • 1616414113105
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutFailureMessagestring-The sign-in/sign-out error messageLogin incorrect +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutFirstSeenlong-The first time the object sign-in/sign-out was seen1713903612 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutHashIdlong-The FNV of the object sign-in/sign-out meta-8981232070268295229 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutLastSeenlong-The last time the object sign-in/sign-out was seen1713903612 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutMetaTypeint-The sign-in/sign-out meta1 - LOGIN_OUT_META_TYPE_OPENSSH +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutSessionIdlong-The sign-in/sign-out session ID260 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutSourceAddressstring-The sign-in/sign-out source IP10.10.10.10 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectLoginOutStatusint-The sign-in/sign-out status-1 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectNamestring-The base name of the object file or processnet.exe +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectNamestring-The object name +
    +
  • /usr/bin/bash
  • +
  • /bin/bash
  • +
  • /opt/folder1/probes/system/processes/processes
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectPidint-The object process PID +
    +
  • 17000
  • +
  • 22000
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
objectPidint-The PID of target process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectPortintPortThe port number used by internet event- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectProcessHashIdlong-FNV of target process +
    +
  • 1415699552492662761
  • +
  • -100650285065767982
  • +
  • -1139416698673814436
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRawDataSizedynamic-The raw data size of the Windows event object +
    +
  • 9
  • +
  • 1
  • +
  • 564
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRawDataStrdynamic-The data contents of the AMSI event +
    +
  • $global:?
  • +
  • 0
  • +
  • $servicename = "WinRM" +$arrService = Get-Service $servicename + +if ($arrService.Status -ne "Running") + +{ + + Restart-Service $servicename + + +} +
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryDatastringRegistryValueDataThe registry data contentsC:\Program Files\AlertMedia\AlertMedia Desktop Notifications\AlertMedia.exe +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRegistryDatastringRegistryValueDataThe registry value data +
    +
  • {11111111-1111-1111-1111-111111111111}
  • +
  • 1
  • +
  • 0
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryKeyHandlestringRegistryKeyThe registry key path +
    +
  • HKCR\CID\{00000000-0000-0000-0000-000000000001}
  • +
  • HKLM\SOFTWARE\WOW6432Node\Eos
  • +
  • HKCU\SOFTWARE\Cerner\InstantAccess
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryKeyHandlestringRegistryKeyThe registry key +
    +
  • HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
  • +
  • HKLM\system\currentcontrolset\services\w32time\config
  • +
  • HKLM\system\currentcontrolset\services\tcpip\parameters
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryRootint-The Windows Registry Root ID +
    +
  • 3
  • +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegistryValuestringRegistryValueThe registry value name +
    +
  • 1
  • +
  • key
  • +
  • reg
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectRegistryValuestringRegistryValueRegistry value name +
    +
  • lastknowngoodtime
  • +
  • threadingmodel
  • +
  • epoch
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRegTypeint-The Windows Registry Type ID +
    +
  • 1
  • +
  • 11
  • +
  • 4
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectRunAsLocalAccountbool-The "runas" command uses a local account +
    +
  • 1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSessionIdstring-The object session ID +
    +
  • 0
  • +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSignerdynamic-The list of object process signers +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
  • SecureWorks Inc
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
objectSignerdynamic-Certificate signer of object process or file +
    +
  • Microsoft Windows
  • +
  • Software Signing;Apple Code Signing Certification Authority;Apple Root CA;
  • +
  • Microsoft Corporation
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSignerFlagsAdhocdynamic-The list of object process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
objectSignerFlagsAdhocdynamic-The list of object process or file signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSignerFlagsLibValiddynamic-The list of object process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
objectSignerFlagsLibValiddynamic-The list of object process or file signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSignerFlagsRuntimedynamic-The list of object process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
objectSignerFlagsRuntimedynamic-The list of object process or file signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectSignerValiddynamic-Validity of certificate signer +
    +
  • 1
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectSubTrueTypeint-File object's true sub-type +
    +
  • 5000
  • +
  • 18000
  • +
  • 28001
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectThreadIdstring-The object process thread ID +
    +
  • 10196
  • +
  • 10104
  • +
  • 10004
  • +
+
Trend Micro Apex One as a Service
objectTrueTypeint-File object's true major type +
    +
  • 7
  • +
  • 5
  • +
  • 18
  • +
  • 4051
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectTypestring-The object type +
    +
  • file
  • +
  • process
  • +
  • qil
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • File Security
  • +
+
objectUserstringUserAccountThe owner name of the target process or the login user name +
    +
  • Système
  • +
  • SYSTEM
  • +
  • SISTEMA
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectUserstringUserAccountThe owner name of the target process or the login user name +
    +
  • root
  • +
  • SYSTEM
  • +
  • oracle
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
objectUserDomainstring-The owner domain of the target process +
    +
  • NT AUTHORITY
  • +
  • UNEB
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
objectUserDomainstring-The object user domain +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
objectUserGroupstring-The user group name +
    +
  • staff
  • +
  • _spotlight
  • +
  • wheel
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
onlinestring-The flag to identify whether the endpoint is online +
    +
  • Yes
  • +
  • No
  • +
+
Trend Micro Apex One as a Service
operationLevelint-The level that is used to indicate the handler layer at SOC +
    +
  • 1
  • +
  • 3
  • +
+
Trend Micro Apex One as a Service
originalFileHashesdynamicFileSHA1The hashes of the original file +
    +
  • ba4700bfd55741c657a99fbe416787835fb384da
  • +
  • 639dfe4a69c1e6aace1e4eece3b3bb25af6a1392
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
originalFilePathsdynamic +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The paths of the original fileC:\\Users\\user_name\\Downloads\\run.exe +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
osDescriptionstring-The OS version +
    +
  • Windows 10 (64 bit)
  • +
  • Windows 10 Pro (64 bit) build 19044
  • +
  • Amazon Linux 2 (64 bit) (5.4.188-104.359.amzn2.x86_64)
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osNamestring-The host operating system name +
    +
  • Windows
  • +
  • Linux
  • +
  • macOS
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osTypestring-The host operating system type +
    +
  • 0x00000030
  • +
  • 4
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
osVerstring-The version of the host operating system +
    +
  • Amazon Linux 2
  • +
  • 10.0.19044
  • +
  • 10.0.19042
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentAuthIdstring-The parent authorization ID +
    +
  • 999
  • +
  • 996
  • +
  • 997
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentCmdstringCLICommandThe command line entry of the parent process +
    +
  • C:\WINDOWS\system32\services.exe
  • +
  • C:\Windows\system32\services.exe
  • +
  • /sbin/launchd
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileCreationstring-The time the parent file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172968000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileCurrentOwnerNamestring-The current owner name of the parent file +
    +
  • NT AUTHORITY\SYSTEM
  • +
  • BUILTIN\Administradores
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileCurrentOwnerSidstring-The current security identifier owner of the parent file +
    +
  • S-1-5-32-544
  • +
  • S-1-5-18
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileDaclStringstring-The discretionary access control list of the parent file +
    +
  • D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;OICI;GA;;;SY)(A;OICI;0xa0120000;;;WD)(A;OICI;GA;;;BA)
  • +
  • D:(A;ID;0x1200a9;;;AC)(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;S-1-15-2-2)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileGroupNamestring-The name of the parent file user group +
    +
  • wheel
  • +
  • admin
  • +
  • staff
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileGroupSidstring-The security identifier of the parent process file group +
    +
  • S-1-5-18
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-32-544
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashIdlong-The parent file hash ID +
    +
  • -4092577940452904134
  • +
  • 2141057820373638746
  • +
  • -821808160829839906
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashMd5stringFileMD5The md5 hash of parent process +
    +
  • d8e577bf078c45954f4531885478d5a9
  • +
  • cd10cb894be2128fca0bf0e2b0c27c16
  • +
  • cfd65bed18a1fae631091c3a4c4dd533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashSha1stringFileSHA1The SHA1 hash of parent process +
    +
  • d7a213f3cfee2a8a191769eb33847953be51de54
  • +
  • 1f912d4bec338ef10b7c9f19976286f8acc4eb97
  • +
  • 9ad737cbd8bbdddc96726156dbd3bc03936bf02f
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileHashSha256stringFileSHA2The SHA256 hash of parent process +
    +
  • dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674
  • +
  • f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881
  • +
  • 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileModifiedTimestring-The time the parent file was modified +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172968000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileOriginalNamestringFileNameThe original file name of the parent image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileOwnerNamestring-The owner name of the parent file +
    +
  • root
  • +
  • cit
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentFileOwnerSidstring-The security identifier of the parent file owner +
    +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the parent process +
    +
  • c:\windows\system32\services.exe
  • +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileRemoteAccessbool-The remote access to the parent file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentFileSaclStringstring-The system access control list of the parent file +
    +
  • S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  • +
  • S:NO_ACCESS_CONTROL
  • +
  • S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
parentFileSizestring-The file size of the parent file +
    +
  • 714856
  • +
  • 59952
  • +
  • 5114880
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentHashIdlong-The parent hash ID +
    +
  • -865367326691173681
  • +
  • -2903238741593506113
  • +
  • -4358168316031740439
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentIntegrityLevelint-The integrity level of a parent- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentLaunchTimereal-The time when the parent process was launched +
    +
  • 1653614773895
  • +
  • 1656118625928
  • +
  • 0
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentNamestring-The image name of the parent process +
    +
  • c:\windows\system32\services.exe
  • +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentPidint-The PID of the parent process +
    +
  • 1
  • +
  • 976
  • +
  • 920
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSessionIdint-The parent session ID- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSignerdynamic-The signer of the parent file +
    +
  • Microsoft Windows Publisher
  • +
  • Microsoft Windows
  • +
  • Software Signing;Apple Code Signing Certification Authority;Apple Root CA;
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSignerFlagsAdhocdynamic-The list of parent process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsAdhocdynamic-The list of parent process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSignerFlagsLibValiddynamic-The list of parent process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsLibValiddynamic-The list of parent process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSignerFlagsRuntimedynamic-The list of parent process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
parentSignerFlagsRuntimedynamic-The list of parent process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentSignerValiddynamic-The validity of the parent signer- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentSubTrueTypeint-The true file subtype of the parent file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentTrueTypeint-The true file type of the parent file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
parentUserstring-The type of user that executed the parent process +
    +
  • root
  • +
  • SYSTEM
  • +
  • SISTEMA
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
parentUserDomainstring-The user domain of the parent process +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
patTypestring-The pattern type +
    +
  • NCIE CNC Pattern
  • +
  • NCIE RR Pattern
  • +
  • NCIE User Define Block List
  • +
+
Trend Micro Apex One as a Service
patVerstring-The version of the behavior pattern +
    +
  • 35.1053.00
  • +
  • 630
  • +
  • 35.1071.00
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Cloud App Security
  • +
+
pCompstring-The component that made the detection +
    +
  • CAV
  • +
  • NCIE
  • +
  • TMUFE
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
peerIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of peerHost10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
plangint-The product language +
    +
  • 1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
platformAssetTagsdynamic-The list of platform custom asset tags{"Asset group":["finance"], "some.ip": ["10.1.0.1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
platformAssetTagsdynamic-The list of platform custom asset tags{"Asset group":["finance"], "some.ip": ["10.1.0.1"]} +
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-Internal product ID (Deprecated, use productCode) +
    +
  • 2200
  • +
  • 751
  • +
  • 533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
policyIdstring-The policy ID of which the event was detected +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 007
  • +
  • 003
  • +
  • TM000001
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
policyNamestring-The name of the triggered policy +
    +
  • Steelcase
  • +
  • Cabot
  • +
  • Tigre - Medium Policy
  • +
  • apiPostedPolicy
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
policyTemplatedynamic-The one-to-many data structure +
    +
  • policyName:Monitoreo All Files, template:Managed - All files
  • +
  • policyName:HSS DLP, template:All File Extension
  • +
  • India: Mobile Numbers
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
pplatint-The product platform +
    +
  • 5889
  • +
  • 9217
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processArtifactIdsdynamic-The artifact IDs generated by processAction +
    +
  • 00000000-0000-0000-0000-000000000000_1.dmp
  • +
  • 11111111-1111-1111-1111-111111111111_2.bak
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processCmdstringCLICommandThe subject process command line +
    +
  • "C:\Program Files (x86)\AADM\AADM.exe"
  • +
  • /usr/lib/inet/sendmail -bl -q15m
  • +
  • ComDir
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
processCmdstringCLICommandThe command line entry of the subject process +
    +
  • C:\Windows\system32\lsass.exe
  • +
  • C:\WINDOWS\system32\lsass.exe
  • +
  • nimbus(processes)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileCreationstring-The time the process file was created +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1635172906000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileCurrentOwnerNamestring-The current owner name of the process file +
    +
  • NT AUTHORITY\SYSTEM
  • +
  • BUILTIN\Administrators
  • +
  • BUILTIN\Administradores
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileCurrentOwnerSidstring-The owner of the process file current security identifier +
    +
  • S-1-5-18
  • +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileDaclStringstring-The discretionary access control list of the process file +
    +
  • D:(A;ID;0x1200a9;;;AC)(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;ID;FA;;;SY)
  • +
  • D:(A;ID;FA;;;BA)(A;ID;FA;;;SY)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileGroupNamestring-The name of the process file user group +
    +
  • wheel
  • +
  • admin
  • +
  • staff
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileGroupSidstring-The security identifier of the process file group +
    +
  • S-1-5-18
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-32-544
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashIdlong-The file hash of the process +
    +
  • 2141057820373638746
  • +
  • -821808160829839906
  • +
  • 5222963427542927736
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashMd5stringFileMD5The MD5 hash of the subject process image +
    +
  • cd10cb894be2128fca0bf0e2b0c27c16
  • +
  • 7ac47235c7bb452a03d3afd872f44c9e
  • +
  • cfd65bed18a1fae631091c3a4c4dd533
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha1stringFileSHA1The SHA-1 of the subject process +
    +
  • C0885381EBAC94AB20E78936434FA208F6B65352
  • +
  • ac373ed32b491da22924e2e11e36574e5d582a35
  • +
  • DF93F7DF887E86C3B56539B5046B286001C6F150
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha1stringFileSHA1The SHA1 hash of subject process image +
    +
  • 1f912d4bec338ef10b7c9f19976286f8acc4eb97
  • +
  • ded3833f145989fd86c1f4811b61497298ebc7fd
  • +
  • 9ad737cbd8bbdddc96726156dbd3bc03936bf02f
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileHashSha256stringFileSHA2The SHA256 hash of subject process image +
    +
  • f3feb95e7bcfb0766a694d93fca29eda7e2ca977c2395b4be75242814eb6d881
  • +
  • 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8
  • +
  • 00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileModifiedTimestring-The time the process file was modified +
    +
  • 1652131848000
  • +
  • 1633413236462
  • +
  • 1414554708877
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileOriginalNamestringFileNameThe original file name of the process image +
    +
  • Taskmgr.exe
  • +
  • WINLOGON.EXE
  • +
  • svchost.exe
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileOwnerNamestring-The process file owner name +
    +
  • root
  • +
  • cit
  • +
  • BUILTIN\Administrators
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processFileOwnerSidstring-The security identifier of the process file owner +
    +
  • S-1-5-32-544
  • +
  • S-1-5-18
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFilePathstring +
    +
  • ProcessFullPath
  • +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the subject process +
    +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • c:\windows\syswow64\srts\wmipr.exe
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
+
processFilePathstring +
    +
  • ProcessFullPath
  • +
  • ProcessName
  • +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the subject process +
    +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\lsass.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileRemoteAccessbool-The remote access to the process file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processFileSaclStringstring-The system access control list of the process file +
    +
  • S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  • +
  • S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU)
  • +
  • S:NO_ACCESS_CONTROL
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
processFileSizestring-The file size of the process file +
    +
  • 59952
  • +
  • 59456
  • +
  • 47024
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processHashIdlong-The FNV of subject process +
    +
  • 7114696589795796819
  • +
  • 1307755369266815004
  • +
  • -5015325378148567246
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processImageFileNamesdynamic-The process image file names of detected backup artifacts +
    +
  • C:\Program Files\aaa\bbb\objprocess.exe
  • +
  • C:\Program Files\ccc\ddd\sample.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processLaunchTimereal-The time the subject process was launched +
    +
  • 1653614775212
  • +
  • 1656118626642
  • +
  • 1652098160298
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • /usr/bin/bash
  • +
  • c:\windows\system32\svchost.exe
  • +
  • c:\windows\system32\lsass.exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processPidint-The PID of the subject process +
    +
  • 4
  • +
  • 1
  • +
  • 784
  • +
  • 792
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processSignerdynamic-The process file signer +
    +
  • Microsoft Windows
  • +
  • Microsoft Windows Publisher
  • +
  • Microsoft Corporation
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processSignerFlagsAdhocdynamic-The list of process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsAdhocdynamic-The list of process signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processSignerFlagsLibValiddynamic-The list of process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsLibValiddynamic-The list of process signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processSignerFlagsRuntimedynamic-The list of process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
+
processSignerFlagsRuntimedynamic-The list of process signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processSignerValiddynamic-The validity of the process signer +
    +
  • 1
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processSubTrueTypeint-The true file subtype of the process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processTrueTypeint-The true file type of the process- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
processUserstringUserAccountThe user name of the process or the file creator +
    +
  • SYSTEM
  • +
  • SVC_JENKINS_CODE_DEV
  • +
  • NETWORK SERVICE
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
processUserstringUserAccountThe owner name of subject process image +
    +
  • root
  • +
  • SYSTEM
  • +
  • SISTEMA
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
processUserDomainstring-The process user domain +
    +
  • NT AUTHORITY
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
protoint-The protocol type +
    +
  • TELEMETRY_CONNECTION_TCP
  • +
  • TELEMETRY_CONNECTION_UDP
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
providerGUIDstring-The GUID of the Windows event provider{11111111-1111-1111-1111-111111111111} +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
providerNamestring-The name of the Windows event provider +
    +
  • Microsoft-Windows-Security-Auditing
  • +
  • Microsoft-Windows-WMI-Activity
  • +
  • Microsoft-Windows-TaskScheduler
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
proxystring-The proxy address +
    +
  • proxy.sample:8080
  • +
  • 10.10.10.10:8080
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
pverstring-The product version +
    +
  • 1.2.0.2752
  • +
  • 1.0.345
  • +
  • 1.2.0.2657
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
quarantineFileIdstring-The unique identifier of the quarantined objectASLUMVS0.4FC +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineFilePathstringFileFullPathThe file path of the quarantined objectC:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineFileSha256stringFileSHA2The SHA-256 of the quarantined object84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineTypestring-The descriptive name for the quarantine area +
    +
  • 0
  • +
  • 1
  • +
  • 538
  • +
+
Trend Micro Apex One as a Service
ratingstring-The credibility level +
    +
  • Safe
  • +
  • Unknown
  • +
  • Dangerous
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawDataSizestring-The size of the Windows event log +
    +
  • 1128
  • +
  • 1129
  • +
  • 1127
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
rawDataStrstring-Windows event raw contents +
    +
  • { + "EventData" : { + "LogonType" : "", + "TargetDomainName" : "", + "TargetLogonId" : "", + "TargetUserName" : "", + "TargetUserSid" : "" + } +} +
  • +
  • { + "EventData" : { + "LogonType" : "10", + "TargetDomainName" : "AFASADV", + "TargetLogonId" : "14941011731", + "TargetUserName" : "administrator", + "TargetUserSid" : "S-1-5-21-1507008304-2416677881-2121376573-500" + } +} +
  • +
  • { + "EventData" : { + "LogonType" : "10", + "TargetDomainName" : "AIS", + "TargetLogonId" : "216921070", + "TargetUserName" : "MWoodr01", + "TargetUserSid" : "S-1-5-21-1873864278-1756520048-3043165120-15057" + } +} +
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requeststringURLRequest URL +
    +
  • http://10.10.10.10/fake/site
  • +
  • http:///fake/param.cgi?action=list&group=Alarm.Status
  • +
  • http://fake.com/
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
requestClientApplicationstring-The protocol user agent information +
    +
  • Microsoft-Delivery-Optimization/10.0
  • +
  • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
  • +
  • example Software GmbH
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
requestMethodstring-The network protocol request method +
    +
  • GET
  • +
  • POST
  • +
  • PUT
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
riskConfidenceLevelstring-The risk confidence level +
    +
  • 0
  • +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
+
riskLevelstring-The risk level +
    +
  • 1
  • +
  • high
  • +
  • No Risk
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
rtstring-The event time1657781088000 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
rtDatestring-The date of the log generation1655337600000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtHourint-The hour of the log generation +
    +
  • 9
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtWeekDaystring-The weekday of the log generation +
    +
  • Monday
  • +
  • Tuesday
  • +
  • Friday
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
ruleIdint-The rule ID +
    +
  • 1002795
  • +
  • 1003802
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Network Security
  • +
+
ruleIdint-The rule ID1005566 +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleTypestring-The access rule type +
    +
  • udso
  • +
  • point of entry
  • +
  • unknown
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
scoreint-The Web Reputation Services URL rating +
    +
  • 71
  • +
  • 81
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
secondActstring-The second scan action +
    +
  • Unknown
  • +
  • N/A
  • +
  • Deny Access
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
secondActResultstring-The result of the second scan action +
    +
  • Unknown
  • +
  • N/A
  • +
  • Access denied
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
senderGUIDstring-The sender GUID +
    +
  • 346648FC-9862-D2F0-F94C-FAB1A838ABD7
  • +
  • 36E5239E-EEBA-0100-C10E-C057E0455E1D
  • +
  • 9606BBD5-38A7-9024-83C8-9C88A2AF90CC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
senderIpdynamic-The sender IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
+
sessionIdint-The session ID +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
signerstring-The signer of the fileShenzhen Smartspace Software technology Co.,Limited;Symantec Class 3 SHA256 Code Signing CA;1429491600;1492649999Trend Micro Apex One as a Service
smacstring-The source MAC address +
    +
  • 00:11:22:33:44:55
  • +
  • 66:77:88:99:AA:BB
  • +
  • CC:DD:EE:FF:00:11
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
sourceTypestring-The source type +
    +
  • user defined
  • +
  • sandbox
  • +
  • syscall
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
  • Endpoint Sensor
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
sptintPortThe source port number +
    +
  • 53
  • +
  • 5353
  • +
  • 443
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source address +
    +
  • ::
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Data Detection and Response
  • +
+
srcFileCreationstring-The time the source file was created +
    +
  • 1577865600000
  • +
  • 1626201752000
  • +
  • 1626201750000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileCurrentOwnerNamestring-The current owner name of the source file +
    +
  • NT AUTHORITY\SYSTEM
  • +
  • BUILTIN\Administrators
  • +
  • AUTORIDADE NT\SISTEMA
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileCurrentOwnerSidstring-The current security identifier owner of the source file +
    +
  • S-1-5-18
  • +
  • S-1-5-32-544
  • +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileDaclStringstring-The discretionary access control list of the source file +
    +
  • D:(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;0x1200a9;;;BA)(A;;0x1200a9;;;SY)(A;;0x1200a9;;;BU)(A;;0x1200a9;;;AC)(A;;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)(A;ID;0x1200a9;;;BU)(A;ID;0x1200a9;;;AC)(A;ID;0x1200a9;;;S-1-15-2-2)
  • +
  • D:(A;ID;FA;;;SY)(A;ID;FA;;;BA)
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcFileGroupNamestring-The source file user group name +
    +
  • wheel
  • +
  • staff
  • +
  • NT SERVICE\TrustedInstaller
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileGroupSidstring-The security identifier of the source file group +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-21-3770350686-3666354711-3866293128-513
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileHashIdlong-The source file hash ID +
    +
  • 1102079405020678318
  • +
  • -6926286289273504319
  • +
  • 8528955148329941480
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileHashMd5stringFileMD5The md5 hash of source file +
    +
  • e5d5e9c1f65b8ec7aa5b7f1b1acdd731
  • +
  • a6779bf446db07e4c4ba3516b273c496
  • +
  • 4bb7334fdadc6eccb8e6ab402aae013b
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileHashSha1stringFileSHA1The SHA1 hash of source file +
    +
  • 5d34902fecc1760138212ada36be1e742bda5e52
  • +
  • dbb14dcda6502ab1d23a7c77d405dafbcbeb439e
  • +
  • 2292f8109cd756e790c068a52d50f1b0858f503b
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileHashSha256stringFileSHA2The SHA256 hash of source file +
    +
  • 4eaa002225f4ea2dedcd19b7f1337d7c58ea7dd6d4571c12468dde95e6bcfdaf
  • +
  • e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80
  • +
  • 16b20a3ad485b4fbbe3028c7e743b226db21ea93cacc8b3d7d7d4a731bf02333
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileIsRemoteAccessbool-The remote access of the source file- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileModifiedTimestring-The time the source file was modified +
    +
  • 1626201752000
  • +
  • 1626201750000
  • +
  • 1577865600000
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileOwnerNamestring-The source file owner name +
    +
  • root
  • +
  • NT SERVICE\TrustedInstaller
  • +
  • NT AUTHORITY\SYSTEM
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileOwnerSidstring-The security identifier of the source file owner +
    +
  • S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464
  • +
  • S-1-5-18
  • +
  • S-1-5-32-544
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The source file path +
    +
  • \\cnva-apps\megaclockprod\traveler\travelerprint.accdb
  • +
  • c:\program files\common files\microsoft shared\clicktorun\officesvcmgrschedule.xml
  • +
  • q:\a7_dbs\a4_pkg\a4_packaging.accde
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileSaclStringstring-The system access control list of the source file +
    +
  • S:NO_ACCESS_CONTROL
  • +
  • S:(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  • +
  • S:(AU;IDSAFA;DCLCRPSDWDWO;;;AU)
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcFileSizestring-The file size of the source file +
    +
  • 0
  • +
  • 131072
  • +
  • 196608
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Data Detection and Response
  • +
+
srcFirstSeenstring-The first time the source file was seen +
    +
  • 0
  • +
  • 1656355418449
  • +
  • 1656714760440
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcHashIdlong-The source hash ID +
    +
  • 4070054759888344851
  • +
  • 2177864258235728980
  • +
  • 3476454206648023552
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcLastSeenstring-The last time the source file was seen +
    +
  • 0
  • +
  • 1656355418449
  • +
  • 1656715147313
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSignerdynamic-The signer of the source file +
    +
  • Microsoft Windows
  • +
  • Microsoft Corporation
  • +
  • Google LLC
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcSignerFlagsAdhocdynamic-The list of source file signature adhoc flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSignerFlagsLibValiddynamic-The list of source file signature library validation flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSignerFlagsRuntimedynamic-The list of source file signature runtime flags- +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
srcSignerValiddynamic-The validity of the source file signer- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
srcSubTrueTypeint-The true file subtype of the source file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcTrueTypeint-The true file type of the source file- +
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
statusstring-The HTTP response status code +
    +
  • 200
  • +
  • 500
  • +
  • 403
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
subSystemstring-The sub system informationcom.apple.xpc +
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
suserdynamicEmailSenderThe email sendersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
tacticIddynamicTacticThe list of MITRE tactic IDs +
    +
  • TA0011
  • +
  • TA0008
  • +
  • TA0001
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
tagsdynamic +
    +
  • Technique
  • +
  • Tactic
  • +
+
The detected technique ID based on the alert filter +
    +
  • MITREV9.T1090
  • +
  • MITRE.T1071
  • +
  • MITREV9.T1059.001
  • +
+
+
    +
  • ALL
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
threatNamestring-The threat name +
    +
  • Malicious_CnC_access_on_UDP_blocked
  • +
  • Malicious_CnC_access_on_TCP_blocked
  • +
  • Other protected file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
threatTypestring-The log threat type +
    +
  • 2
  • +
  • 99
  • +
  • 5
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
timezonestring-The host time zone +
    +
  • UTC+00:00
  • +
  • UTC-05:00
  • +
  • UTC-03:00
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
triggerstring-The action trigger +
    +
  • ATSE
  • +
  • On-demand scan
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
triggerInfodynamic-The trigger information[{'triggerModule': 'ODS', 'triggerReason': 'System Schedule Scan'}] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
triggerReasonstring-The cause of the triggered action +
    +
  • FILEMETA.T1027.009.TRICKBOT.SMITRE1B2, T1027.009
  • +
  • ST002
  • +
  • Scheduled Scan (custom)
  • +
  • Scheduled Scan (system)
  • +
  • Remote Scan: the user triggered the Apex One agent from the Trend Vision One console
  • +
  • Manual Scan: the user triggered the local agent
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
urlCatdynamic-The requested URL category +
    +
  • Untested
  • +
  • 158
  • +
  • Web Advertisement
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
userDomainstring +
    +
  • EndpointName
  • +
  • DomainName
  • +
  • AccountDomain
  • +
+
The user domain +
    +
  • example.com.pa
  • +
  • DOMAIN
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
userDomaindynamic-The user domain name +
    +
  • CORP
  • +
  • AUTORIDADE NT
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
vendorstring-The device vendoradataTrend Micro Apex One as a Service
winEventIdint-Event ID of Windows event +
    +
  • 11
  • +
  • 4624
  • +
  • 4670
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 433 +- **Layer:** Endpoint +- **Product:** Trend Micro Apex One as a Service + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Endpoint/Trend Micro Deep Security.md b/pages/Endpoint/Trend Micro Deep Security.md new file mode 100644 index 0000000..ce94ef5 --- /dev/null +++ b/pages/Endpoint/Trend Micro Deep Security.md @@ -0,0 +1,2053 @@ +--- +layout: default +title: Trend Micro Deep Security - Endpoint +--- + +# Trend Micro Deep Security +**Layer:** Endpoint + +This documentation provides detailed information about all fields available for Trend Micro Deep Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
actResultdynamic-The result of an action +
    +
  • Dropped
  • +
  • Successful
  • +
  • Accepted
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • Mobile Security
  • +
+
behaviorCatstring-The matched policy category +
    +
  • Policy Enforcement
  • +
  • Grey-Detection
  • +
  • Threat-Detection
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
catint-The weighted priority of the incident +
    +
  • 100
  • +
  • 200
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectionMetadynamic-The descriptions of the detected techniques['T1204 some description about this technique', 'T1573.001_AES another description about this technique'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
detectionNamesdynamic-The rules that triggered the event['HS_EMOTET.SMAA', 'HM_AVEDOWN.SMZTIG-A', 'HE_DOCQRPHISH.SM'] +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
deviceDirectionstring-Device Direction. If the source IP is in the internal network (the network monitored by Deep Discovery Inspector) it is tagged as outbound. All other cases are inbound. Internal-to-internal is also tagged as outbound. +
    +
  • outbound
  • +
  • inbound
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
+
dmacstring-The MAC address of the destination IP (dest_ip) +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
duserdynamicEmailRecipientThe email recipient +
    +
  • (no user)
  • +
  • SYSTEM
  • +
  • SYSTEM
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the endpoint on which the event was detected10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileOperationstring-The operation of the file +
    +
  • Created
  • +
  • Updated
  • +
  • Deleted
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
filePathstringFileFullPathThe file path without the file name +
    +
  • security
  • +
  • /var/log/audit/audit.log
  • +
  • application
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
filePathNamestringFileFullPathThe file path with the file name +
    +
  • vss
  • +
  • spoolss
  • +
  • /etc/hosts
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
+
firstActstring-The first scan action +
    +
  • Pass
  • +
  • Quarantine
  • +
  • Clean
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
firstActResultstring-The first scan action result +
    +
  • File passed
  • +
  • Unable to quarantine file
  • +
  • File quarantined
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
groupsstring-The OSSEC rule group names +
    +
  • auditd,audit,
  • +
  • dirservice_log,authentication_failure,
  • +
  • windows,authentication_failures,
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
hostIdint-The host ID +
    +
  • 20548
  • +
  • 967
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The computer name of the client host (The hostname from the suspicious URL detected by Deep Discovery Inspector) +
    +
  • Let's Encrypt
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
interestedHoststringDomainNameThe endpoint hostname (For example, if an intranet host accesses a suspicious internet host, the intranet host is the "peerHost" and the internet host is the "interestedHost") +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • es-dtc-w-dc02.example.corp
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
interestedIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the interestedHost10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
+
isEntitystring-The current entity (or after change/modification) +
    +
  • {"key":"<example>","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"running","name":"state","value":"4"}]}
  • +
  • {"key":"<example>":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"stopped","name":"state","value":"1"}]}
  • +
  • {"key":"<example>","type":"File","attributes":[]}
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
majorVirusTypestring-The virus type +
    +
  • Virus
  • +
  • Suspicious Activity
  • +
  • Trojan
  • +
  • TROJ
  • +
+
+
    +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Mobile Security
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
  • File Security Storage
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
malTypestring-The risk type for Network Content Correlation Engine rules +
    +
  • OTHERS
  • +
  • MALWARE
  • +
  • Others
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • File Security
  • +
  • Trend Vision One Container Security
  • +
+
mDeviceGUIDstring-The GUID of the agent host +
    +
  • C5B09EDD-C725-907F-29D9-B8C30D18C48F
  • +
  • C05B75AB-B518-BDD0-D2B5-E9CB631C539F
  • +
  • 9C28ACD3-D0EC-22A4-B08D-5B0BEFF501FC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
mitreVersionstring-The MITRE version +
    +
  • v9
  • +
  • v6
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
mpnamestring-The management product name +
    +
  • Cloud One - Workload Security
  • +
  • Apex Central
  • +
  • Deep Security Software
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
+
mpverstring-The product version +
    +
  • Microsoft-Windows-Security-Auditing
  • +
  • Level -- Medium security
  • +
  • TASK1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
+
oldFileHashstringFileSHA1The SHA-1 of the target process image or target file (wasEntity from an IM event) +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 57247B810B0EE61DD86CE24AC14097B9B5405EEC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
outstring-The IP datagram length (in bytes) +
    +
  • 0
  • +
  • 439
  • +
  • 1314
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
parentPidint-The PID of the parent process- +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
policyIdstring-The policy ID of which the event was detected +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 007
  • +
  • 003
  • +
  • TM000001
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
processCmdstringCLICommandThe subject process command line +
    +
  • "C:\Program Files (x86)\AADM\AADM.exe"
  • +
  • /usr/lib/inet/sendmail -bl -q15m
  • +
  • ComDir
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Vision One Container Security
  • +
+
processImagePathstring-The process triggered by the file event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
processNamestringProcessNameThe image name of the process that triggered the event +
    +
  • c:\windows\system32\svchost.exe
  • +
  • /usr/bin/python2.7
  • +
  • /usr/bin/sed
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
protostring-The exploited layer network protocol +
    +
  • 6
  • +
  • TCP
  • +
  • 17
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
protoFlagstring-The data flags +
    +
  • ACK PSH DF=1
  • +
  • ACK DF=1
  • +
  • DF=1
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
pTagsstring-The event tagging system +
    +
  • attack-T1059.001, mitre attack detection
  • +
  • suppress_alert
  • +
  • SMB
  • +
+
Trend Micro Deep Security
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
quarantineFileIdstring-The unique identifier of the quarantined objectASLUMVS0.4FC +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineFilePathstringFileFullPathThe file path of the quarantined objectC:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
quarantineFileSha256stringFileSHA2The SHA-256 of the quarantined object84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Apex One On-Premises
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
rtDatestring-The date of the log generation1655337600000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtHourint-The hour of the log generation +
    +
  • 9
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtWeekDaystring-The weekday of the log generation +
    +
  • Monday
  • +
  • Tuesday
  • +
  • Friday
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
ruleIdint-The rule ID +
    +
  • 1002795
  • +
  • 1003802
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Network Security
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
scanTypestring-The scan type +
    +
  • realtime_mailmeta-exchange
  • +
  • exchange_mailbox_realtime_detection_logs
  • +
  • gateway_realtime_blocking_traffic
  • +
  • malware_schedule_image
  • +
  • malware_schedule_file
  • +
  • malware_realtime_image
  • +
  • malware_realtime_file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
secondActstring-The second scan action +
    +
  • Unknown
  • +
  • N/A
  • +
  • Deny Access
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
secondActResultstring-The result of the second scan action +
    +
  • Unknown
  • +
  • N/A
  • +
  • Access denied
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
senderGUIDstring-The sender GUID +
    +
  • 346648FC-9862-D2F0-F94C-FAB1A838ABD7
  • +
  • 36E5239E-EEBA-0100-C10E-C057E0455E1D
  • +
  • 9606BBD5-38A7-9024-83C8-9C88A2AF90CC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
shoststringDomainNameThe source hostname +
    +
  • dns.google
  • +
  • sw_us-east-1a_10-124-17-69
  • +
  • sw_us-east-1c_10-124-21-139
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Network Security
  • +
+
smacstring-The source MAC address +
    +
  • 00:11:22:33:44:55
  • +
  • 66:77:88:99:AA:BB
  • +
  • CC:DD:EE:FF:00:11
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
sprocstring-The OSSEC program name +
    +
  • postfix/sendmail
  • +
  • CRON
  • +
  • sshd
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
subRuleIdstring-ID of a subordinate rule +
    +
  • 85262
  • +
  • 914520
  • +
  • 18152
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
+
subRuleNamestring-The subrule name +
    +
  • Pre-authentication failed.
  • +
  • ATTACK T1070.002,T1070.004: Indicator Removal on Host : Clear Linux or Mac System Logs,File Deletion
  • +
  • ATTACK T1110: Multiple Windows Logon Failures
  • +
  • invisible_url_domain
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Email Sensor
  • +
+
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
targetstring-The target object for the behavior +
    +
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • +
  • zwwritevirtualmemory
  • +
  • /proc/211296/exe
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
targetTypestring-The target object type +
    +
  • File System
  • +
  • Uncategorized
  • +
  • Exploit
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
wasEntitystring-The entity before change/modification +
    +
  • {"key":"<example>","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"stopped","name":"state","value":"1"}]}
  • +
  • {"key":"<example>","type":"Service","attributes":[{"friendlyValue":null,"name":"binaryPathName","value":"C:\\Windows\\system32\\vssvc.exe"},{"friendlyValue":"manual","name":"startType","value":"3"},{"friendlyValue":"running","name":"state","value":"4"}]}
  • +
  • {"key":"<example>","type":"File","attributes":[]}
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
winEventIdint-The Windows Event ID +
    +
  • 11
  • +
  • 4624
  • +
  • 4670
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 79 +- **Layer:** Endpoint +- **Product:** Trend Micro Deep Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Identity/Active Directory (on-premises).md b/pages/Identity/Active Directory (on-premises).md new file mode 100644 index 0000000..3195de0 --- /dev/null +++ b/pages/Identity/Active Directory (on-premises).md @@ -0,0 +1,206 @@ +--- +layout: default +title: Active Directory (on-premises) - Identity +--- + +# Active Directory (on-premises) +**Layer:** Identity + +This documentation provides detailed information about all fields available for Active Directory (on-premises). + + + +
+ + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
netBiosDomainNamestringDomainNameThe NetBIOS domain nameTRENDActive Directory (on-premises)
+
+ +## Field Statistics +- **Total Fields:** 1 +- **Layer:** Identity +- **Product:** Active Directory (on-premises) + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Identity/Microsoft Entra ID.md b/pages/Identity/Microsoft Entra ID.md new file mode 100644 index 0000000..ff46ada --- /dev/null +++ b/pages/Identity/Microsoft Entra ID.md @@ -0,0 +1,884 @@ +--- +layout: default +title: Microsoft Entra ID - Identity +--- + +# Microsoft Entra ID +**Layer:** Identity + +This documentation provides detailed information about all fields available for Microsoft Entra ID. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actionNamestring-The user or service action +
    +
  • Create User
  • +
  • Add member to group
  • +
  • Update application
  • +
+
Microsoft Entra ID
applicationstring-The displayed application nameapp01Microsoft Entra ID
applicationIdstring-The Microsoft Entra ID application ID11111111-1111-1111-1111-111111111111Microsoft Entra ID
authenticationProtocolstring-The authentication protocol or grant type +
    +
  • none
  • +
  • oAuth2
  • +
+
Microsoft Entra ID
autonomousSystemNumberint-The network Autonomous System Number1023Microsoft Entra ID
clientAppstring-The app that the client accessed +
    +
  • browser
  • +
  • Mobile Apps and Desktop clients
  • +
+
Microsoft Entra ID
clientBrowserstring-The client browserChrome 119.0.0Microsoft Entra ID
clientCredentialTypestring-The user client or service principal credential type +
    +
  • none
  • +
  • clientSecret
  • +
+
Microsoft Entra ID
clientDisplayNamestringEndpointNameThe client display nameDESKTOP-TKOS222Microsoft Entra ID
clientIdstring-The unique client device ID11111111-1111-1111-1111-111111111111Microsoft Entra ID
clientOSstring-The client OSWindowsMicrosoft Entra ID
conditionalAccessStatusstring-The conditional access policy status +
    +
  • success
  • +
  • failure
  • +
+
Microsoft Entra ID
correlationIdstring-The correlation id11111111-1111-1111-1111-111111111111Microsoft Entra ID
crossTenantAccessTypestring-The cross-tenant access type +
    +
  • none
  • +
  • b2bCollaboration
  • +
+
Microsoft Entra ID
eventAdditionalDetailsdynamic-The raw data string that contains additional information[{"key": "<example>","value": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)"}]Microsoft Entra ID
eventCategorystring-The resource category targeted by the event +
    +
  • UserManagement
  • +
  • ApplicationManagement
  • +
+
Microsoft Entra ID
eventIdstring-The identity provider event ID +
    +
  • 1 - EVENT_SOURCE_AAD_SIGN_INS
  • +
  • 2 - EVENT_SOURCE_AAD_DIR_AUDIT
  • +
+
Microsoft Entra ID
eventNamestring-The identity provider event name +
    +
  • 4624
  • +
  • aad_signin
  • +
+
Microsoft Entra ID
eventTimereal-The time the identity provider detected the event1657781088000Microsoft Entra ID
idpIdstring-The internal product code of the identity provider +
    +
  • aad
  • +
  • opa
  • +
+
Microsoft Entra ID
idpIssuerNamestring-The identity provider that issued the tokensts.microsoft.comMicrosoft Entra ID
idpNamestring-The identity provider +
    +
  • Microsoft Entra ID
  • +
  • Microsoft Active Directory
  • +
  • google
  • +
+
Microsoft Entra ID
incomingTokentypestring-The authentication token types +
    +
  • none
  • +
  • primaryRefreshToken
  • +
+
Microsoft Entra ID
initiatedByAppDisplayNamestring-The application display nameMicrosoft IntuneMicrosoft Entra ID
initiatedByAppIdstring-The resource category targeted by the event11111111-1111-1111-1111-111111111111Microsoft Entra ID
initiatedByServicePrincipalIdstring-The unique ID of the service principal11111111-1111-1111-1111-111111111111Microsoft Entra ID
initiatedByServicePrincipalNamestring-The unique ID of the service principal +
    +
  • Microsoft Intune
  • +
+
Microsoft Entra ID
initiatedByUserDisplayNamestringUserAccountThe user display nameSample UserMicrosoft Entra ID
initiatedByUserHomeTenantIdstring-The tenant ID of the userMicrosoft Entra ID
initiatedByUserHomeTenantNamestring-The tenant ID of the userMicrosoft Entra ID
initiatedByUserIdstringUserAccountThe unique ID of the user who initiated the eventMicrosoft Entra ID
initiatedByUserIpAddressstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The client IP of the user10.10.10.10Microsoft Entra ID
initiatedByUserPrincipalNamestringUserAccountThe User Principal Name of the usersample_email@trendmicro.comMicrosoft Entra ID
ipAddressstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The client IP10.10.10.10Microsoft Entra ID
locationCitystring-The city where the event happenedSingaporeMicrosoft Entra ID
locationCountrystring-The country where the event happened +
    +
  • US
  • +
  • TW
  • +
+
Microsoft Entra ID
locationLatitudestring-The latitude of the event location121.568Microsoft Entra ID
locationLongitudestring-The longitude of the event location121.568Microsoft Entra ID
locationStatestring-The state where the event happenedCentral SingaporeMicrosoft Entra ID
logBatchIdstring-The batch data retrieval process ID11111111-1111-1111-1111-111111111111Microsoft Entra ID
loggedByServicestring-The service that initiated the eventCore DirectoryMicrosoft Entra ID
operationTypestring-The operation performed in the event +
    +
  • Add
  • +
  • Assign
  • +
  • Update
  • +
+
Microsoft Entra ID
orgIdstring-The organization ID11111111-1111-1111-1111-111111111111Microsoft Entra ID
pnamestring-The internal product ID +
    +
  • 2200
  • +
  • 751
  • +
  • 533
  • +
+
Microsoft Entra ID
principalNamestringUserAccountThe User Principal Namesample_email@trendmicro.comMicrosoft Entra ID
productCodestring-The internal product code of the identity provider (aad=Microsoft Entra ID, opa=Microsoft Active Directory) +
    +
  • aad
  • +
  • opa
  • +
+
+
    +
  • ALL
  • +
  • Microsoft Entra ID
  • +
+
requestMethodstring-The sign-in authentication method[{"authenticationStepDateTime": "2023-11-28T03:44:05Z","authenticationMethod": "Previously satisfied","authenticationMethodDetail": null,"succeeded" : true,"authenticationStepResultDetail": "MFA requirement satisfied by claim in the Token","authenticationStepRequirement": ""}]Microsoft Entra ID
resultstring-The event result +
    +
  • success
  • +
  • failure
  • +
  • timeout
  • +
+
Microsoft Entra ID
resultReasonstring-The cause of event failure or timeout +
    +
  • success
  • +
  • failure
  • +
  • timeout
  • +
+
Microsoft Entra ID
riskEventTypesdynamic-The associated sign-in risk event types['unlikelyTravel', 'anonymizedIPAddress']Microsoft Entra ID
servicePrincipalIdstring-The service principal ID11111111-1111-1111-1111-111111111111Microsoft Entra ID
servicePrincipalNamestring-The service principal nameService_01Microsoft Entra ID
signInCountriesdynamic-The countries from which a user signed in +
    +
  • PH
  • +
  • AU
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Microsoft Entra ID
  • +
+
signInEventTypesdynamic-The sign-in event type['interactiveUser', 'nonInteractiveUser']Microsoft Entra ID
signInIdentifierTypestring-The sign-in ID type +
    +
  • userPrincipalName
  • +
  • phoneNumber
  • +
+
Microsoft Entra ID
statusstring-The sign-in status result +
    +
  • 50126
  • +
  • 50155
  • +
+
Microsoft Entra ID
statusDetailstring-The additional information about sign-in statusMFA requirement satisfied by claim in the tokenMicrosoft Entra ID
statusReasonstring-The sign-in status +
    +
  • Error validating credentials due to invalid username or password.
  • +
  • Others.
  • +
+
Microsoft Entra ID
targetResourceDisplayNamestring-The target resource display nameMicrosoft GraphMicrosoft Entra ID
targetResourceIdstring-The target resource ID11111111-1111-1111-1111-111111111111Microsoft Entra ID
targetResourcesdynamic-The targeted resource of the eventMicrosoft Entra ID
tenantIdstring-The Microsoft Entra ID Tenant ID of the organization11111111-1111-1111-1111-111111111111Microsoft Entra ID
userAgentstring-The user agent +
    +
  • Microsoft.OData.Client/7.12.5
  • +
  • Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
  • +
+
Microsoft Entra ID
userDisplayNamestringUserAccountThe user display nameTest User(RD-TW)Microsoft Entra ID
userIdstringUserAccountThe user ID11111111-1111-1111-1111-111111111111Microsoft Entra ID
userSessionIdstring-The session ID11111111-1111-1111-1111-111111111111Microsoft Entra ID
userTypestring-The tenant user type +
    +
  • member
  • +
  • guest
  • +
+
Microsoft Entra ID
+
+ +## Field Statistics +- **Total Fields:** 67 +- **Layer:** Identity +- **Product:** Microsoft Entra ID + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/Mobile Network Security.md b/pages/Network/Mobile Network Security.md new file mode 100644 index 0000000..c6571d2 --- /dev/null +++ b/pages/Network/Mobile Network Security.md @@ -0,0 +1,957 @@ +--- +layout: default +title: Mobile Network Security - Network +--- + +# Mobile Network Security +**Layer:** Network + +This documentation provides detailed information about all fields available for Mobile Network Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
categorystring-The event category +
    +
  • Exploits
  • +
  • Reconnaissance
  • +
  • Vulnerabilities
  • +
  • Security Policy
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Mobile Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
cntstring-The total number of logs +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
dhoststringDomainNameThe destination hostname10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
dOSClassstring-The destination device OS classLinuxMobile Network Security
dOSNamestring-The destination host OS +
    +
  • Windows
  • +
  • Windows 10
  • +
  • Android
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
dOSVendorstring-The destination device OS vendorOthersMobile Network Security
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstEquipmentIdstring-The destination IMEI350548054087659Mobile Network Security
dstFamilystring-The destination device familyComputerMobile Network Security
dstGroupstring-The group name defined by the administrator of the destination +
    +
  • Default
  • +
  • Data Center Services DL_Deployed Block
  • +
  • Rede Wifi Visitantes-Pacientes
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
dstSubscriberDirNumstring-The destination MSISDN8618687654321Mobile Network Security
dstSubscriberIdstring-The destination IMSI466686007810478Mobile Network Security
dstTypestring-The destination device typeDesktop/LaptopMobile Network Security
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
icmpCodeint-The ICMP protocol code field0Mobile Network Security
icmpTypeint-The ICMP protocol type +
    +
  • 3
  • +
+
Mobile Network Security
instanceIdstring-The ID of the instance that indicates the meta-cloud or data center VM +
    +
  • 52294e7b-f732-c6e9-b2c3-7a6b6f50d101
  • +
  • 00030912-c5e7-4348-9012-7c684751c531
  • +
  • 0008ae58-db0c-34ee-3e5c-5dfc9b10a739
  • +
  • i-0b22a22eec53b9321
  • +
  • /subscriptions/bae4f362-e3a0-482f-ba7a-f883d8b410ce/resourceGroups/avtd-csf-sg-lzniibr0/providers/Microsoft.Compute/virtualMachines/avtd-csf-scanner-lzniibr0
  • +
  • ocid1.instance.oc1.us-ashburn-1.an2g6ljrgs553pqcjuokzvvwpmwxh564f6f5sx3jpi2sowt6as44uejmsrzq
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Network Security
  • +
+
instanceNamestring-The name of the instance that indicates the meta-cloud or data center VMinstapecot-1Mobile Network Security
malSrcstringFileFullPathThe malware infection source +
    +
  • \\10.172.1.33\kortiz
  • +
  • \\10.240.0.148\wbind
  • +
  • \\10.240.1.69\MT26933059
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Network Security
  • +
+
policyNamestring-The name of the triggered policy +
    +
  • Steelcase
  • +
  • Cabot
  • +
  • Tigre - Medium Policy
  • +
  • apiPostedPolicy
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
protostring-The exploited layer network protocol +
    +
  • 6
  • +
  • TCP
  • +
  • 17
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
ruleIdint-The rule ID +
    +
  • 1002795
  • +
  • 1003802
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Network Security
  • +
+
ruleId64long-The IPS rule ID +
    +
  • 1134268
  • +
  • 4026531849
  • +
  • 4026531852
  • +
+
+
    +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
shoststringDomainNameThe source hostname +
    +
  • dns.google
  • +
  • sw_us-east-1a_10-124-17-69
  • +
  • sw_us-east-1c_10-124-21-139
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Network Security
  • +
+
sOSClassstring-The source device OS classLinuxMobile Network Security
sOSNamestring-The source OS +
    +
  • Windows
  • +
  • Windows 10
  • +
  • Windows XP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
sOSVendorstring-The source device OS vendorOthersMobile Network Security
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcEquipmentIdstring-The source IMEI350548054087659Mobile Network Security
srcFamilystring-The source device familyComputerMobile Network Security
srcGroupstring-The group named defined by the source administrator +
    +
  • Default
  • +
  • Rede DATACENTER example/example - AD example CORP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
srcSubscriberDirNumstring-The source MSISDN8618687654321Mobile Network Security
srcSubscriberIdstring-The source IMSI466686007810478Mobile Network Security
srcTypestring-The source device typeDesktop/LaptopMobile Network Security
vLANIdint-The virtual LAN ID- +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 41 +- **Layer:** Network +- **Product:** Mobile Network Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/Network Sensor.md b/pages/Network/Network Sensor.md new file mode 100644 index 0000000..8a29347 --- /dev/null +++ b/pages/Network/Network Sensor.md @@ -0,0 +1,4811 @@ +--- +layout: default +title: Network Sensor - Network +--- + +# Network Sensor +**Layer:** Network + +This documentation provides detailed information about all fields available for Network Sensor. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
appstring-The network protocolHTTP +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
appGroupstring-The app category of the event +
    +
  • DNS Response
  • +
  • HTTP
  • +
  • CIFS
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
aptCampaignsdynamic-The related APT campaigns +
    +
  • POSSIBLE LSTUDIO
  • +
  • WEB LURKER
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
aptRelatedstring-The event is related to an APT +
    +
  • 0
  • +
  • 1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
archFilesdynamic-The file information extracted from detected filesNone +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
attachmentFileHashstringFileSHA1The SHA-1 of the email attachment +
    +
  • C9877617DB6715792F9D5C959C1E8D4E56D0C281
  • +
  • 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722
  • +
  • 0E56D9540B07ED15EF745348D35C72A6A00A0BD9
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileHashSha256stringFileSHA2The SHA-256 of the attached file (attachementFileName) +
    +
  • D81D4C14DDEB8CA390FFADA69265AAD46CDEDD72CDD332CB8AA17D924626B397
  • +
  • 01DE1FC697D2D0850F0468474A3E1E0BF4D78B23F0633908CF82E504E0DCBFF9
  • +
  • 02D16D9970AB635A7B05C3A268E23F5B41C419DD022F1054E9FD912BE130BDB0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
+
attachmentFileNamedynamicFileNameThe file name of an attachment +
    +
  • Mail Body
  • +
  • image001.png
  • +
  • image002.png
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileSizestring-The file size of the email attachment +
    +
  • 190843
  • +
  • 104454
  • +
  • 112197
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileTypestring-The file type of the email attachment +
    +
  • PDF
  • +
  • TEXT
  • +
  • PKZIP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
botCmdstringCLICommandThe bot command +
    +
  • 1068
  • +
  • indows
  • +
  • chrome.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
botUrlstringURLThe bot URL +
    +
  • 7?01
  • +
  • 0000
  • +
  • indows
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDestinationstringURLThe destination domain, IP, URL, or recipient +
    +
  • 10.10.10.10:443
  • +
  • www.example.dns04.com
  • +
  • example.ru
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDestinationFormatstring-C&C server access format +
    +
  • IP_DOMAIN
  • +
  • URL
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDetectionstring-Is this log identified as a C&C callback address detectionYes +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDetectionSourcestring-Which list defines this CCCA detection rule +
    +
  • CCCA_GLOBAL_LIST (0)
  • +
  • GLOBAL_INTELLIGENCE
  • +
  • USER_DEFINED
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaRiskLevelint-The severity level of the threat actors associated with the C&C servers +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientFlagstring-Whether the client is a source or destination +
    +
  • dst
  • +
  • src
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientGroupstring-The client IP network group +
    +
  • myCompany
  • +
  • myGroup
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
clientHoststring-The client IP host name +
    +
  • sample.test.com
  • +
  • sample.tw.test.org
  • +
+
Network Sensor
clientIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The endpoint IP address10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientMACstring-The client MAC address00-00-00-ff-ff-ff +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientPortintPortThe client port number5566 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cntstring-The total number of logs +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
compressedFileHashstringFileSHA1The SHA-1 of the decompressed archive +
    +
  • 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA
  • +
  • FA71B59F35F0EE44D27F74917EF5A0DA2797E80B
  • +
  • 14D2302172EB81465CE12E01361AE24CDE170F7B
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileHashSha256stringFileSHA2The SHA-256 of the compressed suspicious file +
    +
  • 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F
  • +
  • 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE
  • +
  • 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileNamestringFileNameThe file name of the compressed file +
    +
  • /proc/32058/fd/150
  • +
  • NONAMEFL
  • +
  • /proc/10006/fd/30
  • +
  • VirusActionSample/RPF2_OtherMalwareSample-other.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
compressedFileSizestring-The file size of the decompressed archive file +
    +
  • 0
  • +
  • 265314
  • +
  • 175864
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
compressedFileTypestring-The file type of the decompressed archive file +
    +
  • EXE
  • +
  • JAVA
  • +
  • PDF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
correlationCatstring-The correlation category +
    +
  • Suspicious Traffic
  • +
  • Authentication
  • +
  • Reconnaissance
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cvestring-The CVE identifier +
    +
  • MS17-010
  • +
  • CVE-2021-45046
  • +
  • CVE-2021-44228
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cvesdynamic-The CVEs associated with this filter +
    +
  • CVE-2014-3567
  • +
  • CVE-2016-6304
  • +
  • CVE-2011-1385
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data0string-The value of the DDI Correlation log +
    +
  • 1
  • +
  • USR_SUSPICIOUS_IP.UMXX
  • +
  • USR_SUSPICIOUS_URL.UMXX
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data0Namestring-The name of the DDI Correlation log +
    +
  • Malware Name
  • +
  • Attacked this IP
  • +
  • IP Address under Attack
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data1string-The Deep Discover Inspector correlation log metadata10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data1Namestring-The name of the DDI Correlation log +
    +
  • Port Used
  • +
  • Malicious File Transferred To This IP Address
  • +
  • Malware Server IP Address
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data2string-The value of the DDI Correlation log +
    +
  • 1
  • +
  • 10003
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data2Namestring-The name of the DDI Correlation log +
    +
  • Number of Malware Files Downloaded
  • +
  • Protocol
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data3string-The value of the DDI Correlation log +
    +
  • 1
  • +
  • 10.10.10.10
  • +
  • 23903
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data4string-The value of the DDI Correlation log10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dceHash1string-The Trend Micro Threat Mitigation Server requires the log, but the Trend Micro Threat Mitigation Server is EOL.0 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dceHash2string-The Trend Micro Threat Mitigation Server requires the log, but the Trend Micro Threat Mitigation Server is EOL.0 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListFileHashstringFileSHA1The SHA-1 of the Virtual Analyzer Suspicious Object +
    +
  • 746C4D6048A409F33446463B28CA21CB2C5DD941
  • +
  • DAA66CE3C1F08144885BB0E99837030C5231DE60
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListFileHashSha256string-The SHA-256 of User-Defined Suspicious Object757E5C8823CAA7406030A7E26AED2A2C95D16F69C5A14C884C8CAA72A0C001C3 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListHoststringDomainNameThe domain of the Virtual Analyzer Suspicious Object +
    +
  • www.example.dns01.com
  • +
  • example.com
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the Virtual Analyzer Suspicious Object10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListRequeststring-Block list event request +
    +
  • *
  • +
  • test.url.com
  • +
  • https://example.com:443/gfx/flags/ua.png
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListTypestring-Block list type +
    +
  • Deny List URL
  • +
  • Deny List File SHA1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
deviceDirectionstring-Device Direction. If the source IP is in the internal network (the network monitored by Deep Discovery Inspector) it is tagged as outbound. All other cases are inbound. Internal-to-internal is also tagged as outbound. +
    +
  • outbound
  • +
  • inbound
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
+
deviceGUIDstring-The GUID of the agent which reported the detection +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
deviceGUIDstring-The non-endpoint object such as a network appliance11111111-1111-1111-1111-111111111111 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
deviceMacAddressstring-The device mac address +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
devicePayloadIdstring-The device payload ID +
    +
  • 0:14343219::F:S
  • +
  • 0:94174860::F:
  • +
  • 0:9665982::F:
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
deviceRiskConfidenceLevelint-The confidence level of device risk- +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dhoststringDomainNameThe destination hostname10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
directionstring-The object transfer directionDownload +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dmacstring-The MAC address of the destination IP (dest_ip) +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
dnsQueryTypestring-The record type requested by the DNS protocolA +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
domainNamestringDomainNameThe detected domain name +
    +
  • http://10.10.10.10
  • +
  • example.domain.com
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
+
dOSNamestring-The destination host OS +
    +
  • Windows
  • +
  • Windows 10
  • +
  • Android
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstGroupstring-The group name defined by the administrator of the destination +
    +
  • Default
  • +
  • Data Center Services DL_Deployed Block
  • +
  • Rede Wifi Visitantes-Pacientes
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
dstZonestring-The network zone defined by the destination administrator +
    +
  • 1
  • +
  • 0
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
duserdynamicEmailRecipientThe email recipient +
    +
  • (no user)
  • +
  • SYSTEM
  • +
  • SYSTEM
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
duserdynamicEmailRecipientThe email recipientsample_email@trendmicro.com +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dUser1stringUserAccountThe latest sign-in user of the destinationuser\example +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dvcdynamic-The IP address of the Deep Discover Inspector appliance10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dvcdynamic-The IP address of the Deep Discovery Inspector or Virtual Network Sensor appliance10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dvchoststring-The computer which installed the Trend Micro product +
    +
  • CU-PRO1-9039-2
  • +
  • LTPF32PMNN
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dvchoststring-The network device hostname +
    +
  • my-company-xns
  • +
  • my-ddi
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
eventClassstring-The event category +
    +
  • Suspicious Traffic
  • +
  • Authentication
  • +
  • Reconnaissance
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdstring-The event ID +
    +
  • 200139
  • +
  • 200140
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The name of the log event +
    +
  • SWG_ACTIVITY_LOG
  • +
  • FIREWALL_ACTIVITY_LOG
  • +
  • VPC_ACTIVITY_LOG
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
eventSubClassstring-The category of sub-event class +
    +
  • DNS
  • +
  • Port Mis-use
  • +
  • Port Scanning
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
eventTimereal-The time the agent or product detected the event1657135700000 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
fileExtstring-The file extension of the suspicious file +
    +
  • .lnk
  • +
  • .exe
  • +
  • .EXE
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that violated the policy1e15bf99022a9164708cebb3eace8fd61ad45cba +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file that violated the policyba9edecdd09de1307714564c24409bd25508e22fe11c768053a08f173f263e93 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileNamestring +
    +
  • FileName
  • +
  • FileFullPath
  • +
+
The name of the file that violated the policyword.doc +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
filePathstringFileFullPathThe file path without the file name +
    +
  • security
  • +
  • /var/log/audit/audit.log
  • +
  • application
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
filePathNamestringFileFullPathThe file path with the file name +
    +
  • vss
  • +
  • spoolss
  • +
  • /etc/hosts
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
+
fileSizestring-The file size of the suspicious file +
    +
  • 0
  • +
  • 1255856
  • +
  • 1237880
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileSizestring-The size of the file that is violating the policy12134 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileTypestring-The file type of the suspicious file +
    +
  • EXE
  • +
  • LNK
  • +
  • MIME
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileTypestring-The type of file which is violating the policyMicrosoft Words +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
filterRiskLevelstring-The top level filter risk of the event +
    +
  • info
  • +
  • low
  • +
  • medium
  • +
+
+
    +
  • ALL
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
firmalwaredynamic-The firmware version of Deep Discover Inspector +
    +
  • 2017-12-01 15:05:07-05:00 3.83.1170 5.0.1555
  • +
  • 2020-11-13 18:04:29-05:00 5.0.1555 5.5.1200
  • +
  • 2020-11-13 18:43:30-05:00 5.5.1200 5.7.1178
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
flowIdstring-The network analysis flow ID6837014561409730558 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ftpTransdynamic-The transaction information of the FTP protocolNone +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
hasdtasresstring-Whether the log contains a report from Virtual Analyzer +
    +
  • No
  • +
  • Yes
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
heurFlagint-Whether it has an Advanced Threat Scan Engine detection +
    +
  • 1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The computer name of the client host (The hostname from the suspicious URL detected by Deep Discovery Inspector) +
    +
  • Let's Encrypt
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The host nameNJ-EFFY-ZHAO1 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
hostSeverityint-The severity of the threat (specific to the interestedIp) +
    +
  • 1
  • +
  • 2
  • +
  • 4
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
hotFixdynamic-The applied Deep Discover Inspector hotfix version +
    +
  • 2021-07-22 15:08:01+08:00 Hotfix 1042 hfb1042 Apply
  • +
  • 2021-12-22 09:03:42-06:00 Hotfix 1211 hfb1211 Apply
  • +
  • 2022-03-30 13:16:28-07:00 Hotfix 1218 hfb1218 Apply
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpLocationstringURLThe HTTP location headerwww.google.com.tw +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpRefererstringURLThe HTTP referer +
    +
  • http://172.16.58.233/
  • +
  • http://example/page1/
  • +
  • https://www.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
httpRefererstringURLThe HTTP referrer headerwww.google.com.tw +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpXForwardedForstring-The HTTP X-Forwarded-For header10.10.10.10, 10.10.10.11, 10.10.10.12 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpXForwardedForGroupstring-The X-Forwarded-For IP network group +
    +
  • myCompany
  • +
  • myGroup
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
httpXForwardedForHoststring-The X-Forwarded-For IP host name +
    +
  • sample.test.com
  • +
  • sample.tw.test.org
  • +
+
Network Sensor
httpXForwardedForIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The x-forwarded-for IP used by the network appliance10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpXForwardedForPortint-The patched HTTP server port when the network appliance selects an x-forwarded-for IP address to use65535 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
interestedGroupstring-The network group associated with the user-defined source IP or destination IP +
    +
  • Default
  • +
  • Rede DATACENTER Lumen/FORTIGATE - AD ESTACIO CORP
  • +
  • Data Center Services DL_Deployed Block
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
interestedHoststringDomainNameThe endpoint hostname (For example, if an intranet host accesses a suspicious internet host, the intranet host is the "peerHost" and the internet host is the "interestedHost") +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • es-dtc-w-dc02.example.corp
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
interestedIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the interestedHost10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
+
interestedMacAddressstring-The MAC address identified as the log owner's +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
+
ircChannelNamestring-The IRC channel name +
    +
  • ManageEngine
  • +
  • unknown
  • +
  • Global Product Delivery Group
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ircUserNamestring-The IRC user name +
    +
  • R3
  • +
  • ManageEngineCA
  • +
  • DigiCert TLS RSA SHA256 2020 CA1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
isHiddenstring-Whether the detection log generated a grey rule matchYes +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
ja3Hashstring-The fingerprint of an SSL/TLS client application as detected via a network sensor or device +
    +
  • 72a589da586844d7f0818ce684948eea
  • +
  • cd08e31494f9531f560d64c695473da9
  • +
  • 6dca00d8741247e245e4f2a632f1e62b
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ja3Hashstring-The JA3 hash478e74fad764c966f19c5232c7cdfc5a +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ja3sHashstring-The fingerprint of an SSL/TLS server application as detected via a network sensor or device +
    +
  • e54965894d6b45ecb4323c7ea3d6c115
  • +
  • ec74a5c51106f0419184d0dd08fb05bc
  • +
  • ba1b42efc7dc57bb43bf81de59791c1b
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ja3sHashstring-The JA3S hash6d37fb1b3306d6e9f875650d8eb74b4f +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
mailMsgSubjectstringEmailSubjectThe email subject +
    +
  • FW. mail subject
  • +
  • ManageEngine
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
mailMsgSubjectstringEmailSubjectThe email subjecttest +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
malFamilystring-The threat family +
    +
  • EQUATED
  • +
  • STARTER
  • +
  • 0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
malTypestring-The risk type for Network Content Correlation Engine rules +
    +
  • OTHERS
  • +
  • MALWARE
  • +
  • Others
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • File Security
  • +
  • Trend Vision One Container Security
  • +
+
malTypeGroupstring-The risk type group for NCCE (Network Content Correlation Engine) rules. This field comes from NCCP (Network Content Correlation Pattern) rule type definitions. +
    +
  • Others
  • +
  • Malware
  • +
  • Spyware
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
+
mimeTypestring-The MIME type or content type of the response bodytext/html +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
mitigationTaskIdstring-The unique ID to identify the mitigation request +
    +
  • 09dcd06f-2f9c-4bab-8114-f823620fecb6
  • +
  • 0ed72c3c-05af-4c16-b2c4-789eaeccb944
  • +
  • 0f29cfc3-954a-4fd9-954e-bf14f7253d20
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
mitreMappingdynamic-The MITRE tags +
    +
  • T1090 (TA0011)
  • +
  • T1071 (TA0011)
  • +
  • T1071.001 (TA0011)
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
mitreVersionstring-The MITRE version +
    +
  • v9
  • +
  • v6
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
msgIdstringEmailMessageIDThe internet message ID +
    +
  • 66.6.00.0006
  • +
  • example.test.com
  • +
  • dameware1svr
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
msgIdstringEmailMessageIDThe service provider message ID<sample_email@trendmicro.com> +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
objectIpsdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address resolved by the DNS protocol10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
overSslstring-Whether the event was triggered by an SSL decryption stream (Displayed only when SSL Inspection is supported) +
    +
  • Not over SSL/TLS
  • +
  • 0
  • +
  • Over SSL/TLS
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
+
overSslstring-SSL protocol connectionYES +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
pAttackPhasestring-The category of the primary Attack Phase +
    +
  • Lateral Movement
  • +
  • Point of Entry
  • +
  • Asset and Data Discovery
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
pcapUUIDstring-The PCAP file UUID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
pCompstring-The component that made the detection +
    +
  • CAV
  • +
  • NCIE
  • +
  • TMUFE
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
peerEndpointGUIDstring-The endpoint GUID of the agent peer host +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • TippingPoint Security Management System
  • +
+
peerGroupstring-The peer IP group +
    +
  • Default
  • +
  • Rede DATACENTER Lumen/PALOALTO VPNSSL - VPN CLIENT
  • +
  • UHS
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
peerHoststringDomainNameThe hostname of peerIp +
    +
  • dns.google
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
peerIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of peerHost10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-The product name +
    +
  • Secure Web Gateway
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
potentialRiskstring-The tag if it's a potential risk according to heuristics +
    +
  • 1
  • +
  • 0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
ratingstring-The credibility level +
    +
  • Safe
  • +
  • Unknown
  • +
  • Dangerous
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawDataStrstring-The JSON string that contains additional information +
    +
  • {"TLS version": "0x0303", "Cipher Suite": "0xc030"}
  • +
  • {"Scanned ports": "23, 80, 443"}
  • +
  • {"HTTP Content-Type": "application/hal+json", "HTTP Content-Body": "{\\"_links\\": {\\"type\\": {\\"href\\": \\"http://10.10.10.10/rest/type/node/INVALID_VALUE\\"}}, \\"type\\": {\\"target_id\\": \\"article\\"}, \\"title\\": {\\"value\\": \\"My Article\\"}, \\"body\\": {\\"value\\": \\"\\"}}"}
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Vision One Container Security
  • +
  • Network Sensor
  • +
+
rawDataStrstring-The JSON string that contains additional information +
    +
  • {"TLS version": "0x0303", "Cipher Suite": "0xc030"}
  • +
  • {"Scanned ports": "23, 80, 443"}
  • +
  • {"HTTP Content-Type": "application/hal+json", "HTTP Content-Body": "{\\"_links\\": {\\"type\\": {\\"href\\": \\"http://10.10.10.10/rest/type/node/INVALID_VALUE\\"}}, \\"type\\": {\\"target_id\\": \\"article\\"}, \\"title\\": {\\"value\\": \\"My Article\\"}, \\"body\\": {\\"value\\": \\"\\"}}"}
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Vision One Container Security
  • +
  • Network Sensor
  • +
+
rawDataStrstring-The raw data string that contains additional information[{ "oid": "1.2.3.4", "value_type": 4, "value": "MANUFACTURER:SAMPLE\ nMODEL:SAMPLE C1234", "parse": 1}] +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawDstIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP without replacement10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawDstPortintPortThe destination port number without replacement33186 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawSrcIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP without replacement10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawSrcPortintPortThe source port number without replacement80 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
reportGUIDstring-The GUID for Workbench to request report page data +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • File Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
reqAppVersionstring-The client application version numberSSH-2.0-OPENSSH_9.0 +
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
reqDataSizestring-The data volume transmitted over the transport layer by the client (in bytes)15688 +
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
reqScannedBytesstring-The data volume transmitted by the client (in bytes)4655 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requeststringURLThe destination URL that the user is accessing +
    +
  • https://google.com/
  • +
  • https://api/example/v1/testit
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestClientApplicationstring-The protocol user agent information +
    +
  • Microsoft-Delivery-Optimization/10.0
  • +
  • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
  • +
  • example Software GmbH
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
requestClientApplicationstring-The HTTP user agentMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestDatestring-The HTTP date headerFri, 20 Oct 2017 06:02:09 GMT +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestHeadersstring-All HTTP headers without sensitive informationHost: 10.10.10.10:8080 +User-Agent: curl/7.78.0 +Accept: */* + +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestMethodstring-The network protocol request methodPOST +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestMimeTypestring-The type of request contentapplication/json; charset=utf-8 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestsdynamicURLThe URLs of the requestwww.google.com.tw +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
resolvedUrlGroupstring-The IP address FQDN network group +
    +
  • myCompany
  • +
  • myGroup
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
resolvedUrlIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the FQDN10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
resolvedUrlPortintPortThe HTTP server port443 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respAppVersionstring-The server application version numberSSH-2.0-OPENSSH_8.7 +
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
respArchFilesdynamic-The file information extracted from files detected in response directionNone +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respCodestring-The network protocol response code +
    +
  • 200
  • +
  • 25
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respDataSizestring-The data volume transmitted over the transport layer by the server (in bytes)7856 +
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
respDatestring-The HTTP response date headerFri, 20 Oct 2017 06:02:09 GMT +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respFileHashstringFileSHA1The SHA-1 of the file detected in the response directionf17d9c55dea88f9aec8f74363f01e918cffb4142 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respFileHashSha256stringFileSHA2The SHA-256 of the file detected in the response direction5ad4396d67f0c9d54572f051e28e9e62f4010c269a953d25259b17ad5fab4fd5 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respFileTypestring-The file type detected in the response directionPKZIP +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respHeadersstring-All HTTP response headers without sensitive informationAccept-Ranges: bytes +Content-Length: 68 +Content-Type: - text/plain; charset=utf-8 +Last-Modified: Thu, 19 Aug 2021 06:23:54 GMT +Date: Thu, 19 Aug 2021 06:24:00 GMT + +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respMethodstring-The response method +
    +
  • KRB_ERROR
  • +
  • AS_REP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respScannedBytesstring-The data volume transmitted by the server (in bytes)6654 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
riskLevelstring-The risk level +
    +
  • 1
  • +
  • high
  • +
  • No Risk
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rozRatingstring-The VA overall rating +
    +
  • 0
  • +
  • -1
  • +
  • 1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
rtDatestring-The date of the log generation1655337600000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtHourint-The hour of the log generation +
    +
  • 9
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtWeekDaystring-The weekday of the log generation +
    +
  • Monday
  • +
  • Tuesday
  • +
  • Friday
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
ruleIdint-The rule ID +
    +
  • 1002795
  • +
  • 1003802
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Network Security
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
sAttackPhasestring-The category of the second Attack Phase +
    +
  • Lateral Movement
  • +
  • Command and Control Communication
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
scanTsstring-The mail scan time- +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
scoreint-The Web Reputation Services URL rating +
    +
  • 71
  • +
  • 81
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
senderGUIDstring-The sender GUID +
    +
  • 346648FC-9862-D2F0-F94C-FAB1A838ABD7
  • +
  • 36E5239E-EEBA-0100-C10E-C057E0455E1D
  • +
  • 9606BBD5-38A7-9024-83C8-9C88A2AF90CC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
senderIpdynamic-The sender IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
+
serverGroupstring-The server IP network group +
    +
  • myCompany
  • +
  • myGroup
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
serverHoststring-The server IP host name +
    +
  • sample.test.com
  • +
  • sample.tw.test.org
  • +
+
Network Sensor
serverIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The server IP address10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
serverMACstring-The server MAC address00-00-00-ff-ff-ff +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
serverPortintPortThe server port number443 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sessionEndstring-The session end time, in seconds1575462989 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sessionEndReasonstring-The reason why a session was terminated +
    +
  • tcp-fin
  • +
  • tcp-rst-from-server
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
sessionStartstring-The session start time (in seconds)1575462989 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
shoststringDomainNameThe source hostname +
    +
  • dns.google
  • +
  • sw_us-east-1a_10-124-17-69
  • +
  • sw_us-east-1c_10-124-21-139
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Network Security
  • +
+
smacstring-The source MAC address +
    +
  • 00:11:22:33:44:55
  • +
  • 66:77:88:99:AA:BB
  • +
  • CC:DD:EE:FF:00:11
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
sOSNamestring-The source OS +
    +
  • Windows
  • +
  • Windows 10
  • +
  • Windows XP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcGroupstring-The group named defined by the source administrator +
    +
  • Default
  • +
  • Rede DATACENTER example/example - AD example CORP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
srcZonestring-The network zone defined by the source administrator +
    +
  • 1
  • +
  • 0
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertCommonNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The subject common namesettings-win.data.microsoft.com +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertCommonNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The certificate common name*.www.sample.com +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertFingerprintstring-The certificate fingerprint3914af80223c833f26df001cbf342eff8a31aba1 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertIssuerstring-The issuer of the certificate/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance Server CA +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertIssuerCommonNamestring-The issuer common nameMicrosoft Azure TLS Issuing CA 05 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertIssuerOrgNamestring-The issuer organization nameMicrosoft Corporation +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertOrgNamestring-The subject organization nameMicrosoft +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertSANsdynamic-The Subject Alternative Name of the certificate +
    +
  • *.www.sample.com
  • +
  • add.my.sample.com
  • +
  • au.sample.com
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertSerialNumberstring-The certificate serial number0888b1ad2a593310593f47565a5a5a4a +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertValidFromstring-The certificate validity start time2014-11-21T02:43:28 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertValidUntilstring-The certificate validity end time2018-11-21T02:43:28 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
statusstring-The network analysis flow session status2 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
suidstringUserAccountThe user name or IP address (IPv4) +
    +
  • Sample User Name
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
suserdynamicEmailSenderThe email sendersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
suserstringEmailSenderThe email sendersample_email@trendmicro.com +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sUser1stringUserAccountThe latest sign-in user of the source +
    +
  • example\admin
  • +
  • example.us.com\account
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
tacticIddynamicTacticThe list of MITRE tactic IDs +
    +
  • TA0011
  • +
  • TA0008
  • +
  • TA0001
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
tagsdynamic +
    +
  • Technique
  • +
  • Tactic
  • +
+
The detected technique ID based on the alert filter +
    +
  • MITREV9.T1090
  • +
  • MITRE.T1071
  • +
  • MITREV9.T1059.001
  • +
+
+
    +
  • ALL
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
targetSharestringFileFullPathFor HTTPS protocol: Subject State or Province Name; For SMB protocol: Shared folder +
    +
  • 3MHIS
  • +
  • NETLOGON
  • +
  • CA
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
techniqueIddynamicTechniqueTechnique ID detected by the product agent base on a detection rule- +
    +
  • TXOne StellarOne
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
threatNamestring-The threat name +
    +
  • Malicious_CnC_access_on_UDP_blocked
  • +
  • Malicious_CnC_access_on_TCP_blocked
  • +
  • Other protected file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
threatNamesdynamic-The associated threats +
    +
  • HM_GERAL.MIP00000001
  • +
  • HM_JADTRE.MIP00000001
  • +
  • VAN_BOT.UMXX
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
threatTypestring-The log threat type +
    +
  • 2
  • +
  • 99
  • +
  • 5
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
tlsJA3Fingerprintstring-The JA3 fingerprint- +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
tlsJA3SFingerprintstring-The raw JA3S771,157,65281-15 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
tlsSelectedCipherstring-The selected cipher of the TLS protocolc02f +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
urlCatdynamic-The requested URL category +
    +
  • Untested
  • +
  • 158
  • +
  • Web Advertisement
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
userDomainstring +
    +
  • DomainName
  • +
  • AccountDomain
  • +
+
Active directory domain, domain of username for logging in TMAS adminportal adminportaltrendmicro.com +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
vLANIdint-The virtual LAN ID- +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 246 +- **Layer:** Network +- **Product:** Network Sensor + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/Palo Alto Firewall.md b/pages/Network/Palo Alto Firewall.md new file mode 100644 index 0000000..521130d --- /dev/null +++ b/pages/Network/Palo Alto Firewall.md @@ -0,0 +1,266 @@ +--- +layout: default +title: Palo Alto Firewall - Network +--- + +# Palo Alto Firewall +**Layer:** Network + +This documentation provides detailed information about all fields available for Palo Alto Firewall. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
dhoststringDomainNameThe destination hostname +
    +
  • sw_us-east-1c_10-124-21-139
  • +
  • 10.10.10.10
  • +
+
Palo Alto Firewall
dUser1stringUserAccountThe latest logon user of the destination +
    +
  • dhr\m42svc
  • +
  • altsvc
  • +
+
Palo Alto Firewall
fileHashMd5stringFileMD5The MD5 of the filed5120786925038601a77c2e1eB9a3a0aPalo Alto Firewall
requestMethodstring-The network protocol request methodPOSTPalo Alto Firewall
shoststringDomainNameThe source hostname +
    +
  • sw_us-east-1a_10-124-17-69
  • +
  • sw_us-east-1c_10-124-21-139
  • +
+
Palo Alto Firewall
sUser1stringUserAccountThe latest sign-in user of the source +
    +
  • 000c29edef58
  • +
  • sample.com\ser-desktopcentral
  • +
+
Palo Alto Firewall
+
+ +## Field Statistics +- **Total Fields:** 6 +- **Layer:** Network +- **Product:** Palo Alto Firewall + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/TippingPoint Security Management System.md b/pages/Network/TippingPoint Security Management System.md new file mode 100644 index 0000000..d248416 --- /dev/null +++ b/pages/Network/TippingPoint Security Management System.md @@ -0,0 +1,888 @@ +--- +layout: default +title: TippingPoint Security Management System - Network +--- + +# TippingPoint Security Management System +**Layer:** Network + +This documentation provides detailed information about all fields available for TippingPoint Security Management System. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
categorystring-The event category +
    +
  • Exploits
  • +
  • Reconnaissance
  • +
  • Vulnerabilities
  • +
  • Security Policy
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Mobile Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
cvesdynamic-The CVEs associated with this filter +
    +
  • CVE-2014-3567
  • +
  • CVE-2016-6304
  • +
  • CVE-2011-1385
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
deviceGUIDstring-The GUID of the agent which reported the detection +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the endpoint on which the event was detected10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
interestedIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the interestedHost10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
mpnamestring-The management product name +
    +
  • Cloud One - Workload Security
  • +
  • Apex Central
  • +
  • Deep Security Software
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
+
overSslstring-Whether the event was triggered by an SSL decryption stream (Displayed only when SSL Inspection is supported) +
    +
  • Not over SSL/TLS
  • +
  • 0
  • +
  • Over SSL/TLS
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
+
peerEndpointGUIDstring-The endpoint GUID of the agent peer host +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • TippingPoint Security Management System
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
policyIdstring-The policy ID of which the event was detected +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 007
  • +
  • 003
  • +
  • TM000001
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleSetNamestring-The rule set nameAllRules +
    +
  • Trend Vision One Container Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
ruleUuidstring-The signature UUID from the DV (Digital Vaccine) +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 00000001-0001-0001-0001-000000007120
  • +
  • 00000001-0001-0001-0001-000000017056
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 25 +- **Layer:** Network +- **Product:** TippingPoint Security Management System + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/Trend Cloud One - Network Security.md b/pages/Network/Trend Cloud One - Network Security.md new file mode 100644 index 0000000..c27b0e3 --- /dev/null +++ b/pages/Network/Trend Cloud One - Network Security.md @@ -0,0 +1,921 @@ +--- +layout: default +title: Trend Cloud One - Network Security - Network +--- + +# Trend Cloud One - Network Security +**Layer:** Network + +This documentation provides detailed information about all fields available for Trend Cloud One - Network Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
deviceGUIDstring-The GUID of the agent which reported the detection +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the endpoint on which the event was detected10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
interestedIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the interestedHost10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
mpnamestring-The management product name +
    +
  • Cloud One - Workload Security
  • +
  • Apex Central
  • +
  • Deep Security Software
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
+
overSslstring-Whether the event was triggered by an SSL decryption stream (Displayed only when SSL Inspection is supported) +
    +
  • Not over SSL/TLS
  • +
  • 0
  • +
  • Over SSL/TLS
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
+
peerEndpointGUIDstring-The endpoint GUID of the agent peer host +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • TippingPoint Security Management System
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
policyIdstring-The policy ID of which the event was detected +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 007
  • +
  • 003
  • +
  • TM000001
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Vision One Container Security
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleSetNamestring-The rule set nameAllRules +
    +
  • Trend Vision One Container Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
ruleUuidstring-The signature UUID from the DV (Digital Vaccine) +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 00000001-0001-0001-0001-000000007120
  • +
  • 00000001-0001-0001-0001-000000017056
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
subRuleIdstring-ID of a subordinate rule +
    +
  • 85262
  • +
  • 914520
  • +
  • 18152
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
+
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 26 +- **Layer:** Network +- **Product:** Trend Cloud One - Network Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/Trend Micro Deep Discovery Inspector.md b/pages/Network/Trend Micro Deep Discovery Inspector.md new file mode 100644 index 0000000..41efdde --- /dev/null +++ b/pages/Network/Trend Micro Deep Discovery Inspector.md @@ -0,0 +1,4751 @@ +--- +layout: default +title: Trend Micro Deep Discovery Inspector - Network +--- + +# Trend Micro Deep Discovery Inspector +**Layer:** Network + +This documentation provides detailed information about all fields available for Trend Micro Deep Discovery Inspector. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
appstring-The network protocolHTTP +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
appGroupstring-The app category of the event +
    +
  • DNS Response
  • +
  • HTTP
  • +
  • CIFS
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
aptCampaignsdynamic-The related APT campaigns +
    +
  • POSSIBLE LSTUDIO
  • +
  • WEB LURKER
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
aptRelatedstring-The event is related to an APT +
    +
  • 0
  • +
  • 1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
archFilesdynamic-The file information extracted from detected filesNone +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
attachmentFileHashstringFileSHA1The SHA-1 of the email attachment +
    +
  • C9877617DB6715792F9D5C959C1E8D4E56D0C281
  • +
  • 0340A8EE3AD2990E3EDCDB2E471EAA45B4286722
  • +
  • 0E56D9540B07ED15EF745348D35C72A6A00A0BD9
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileHashSha256stringFileSHA2The SHA-256 of the attached file (attachementFileName) +
    +
  • D81D4C14DDEB8CA390FFADA69265AAD46CDEDD72CDD332CB8AA17D924626B397
  • +
  • 01DE1FC697D2D0850F0468474A3E1E0BF4D78B23F0633908CF82E504E0DCBFF9
  • +
  • 02D16D9970AB635A7B05C3A268E23F5B41C419DD022F1054E9FD912BE130BDB0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
+
attachmentFileNamedynamicFileNameThe file name of an attachment +
    +
  • Mail Body
  • +
  • image001.png
  • +
  • image002.png
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileSizestring-The file size of the email attachment +
    +
  • 190843
  • +
  • 104454
  • +
  • 112197
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Email Sensor
  • +
+
attachmentFileTypestring-The file type of the email attachment +
    +
  • PDF
  • +
  • TEXT
  • +
  • PKZIP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
botCmdstringCLICommandThe bot command +
    +
  • 1068
  • +
  • indows
  • +
  • chrome.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
botUrlstringURLThe bot URL +
    +
  • 7?01
  • +
  • 0000
  • +
  • indows
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDestinationstringURLThe destination domain, IP, URL, or recipient +
    +
  • 10.10.10.10:443
  • +
  • www.example.dns04.com
  • +
  • example.ru
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDestinationFormatstring-C&C server access format +
    +
  • IP_DOMAIN
  • +
  • URL
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDetectionstring-Is this log identified as a C&C callback address detectionYes +
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaDetectionSourcestring-Which list defines this CCCA detection rule +
    +
  • CCCA_GLOBAL_LIST (0)
  • +
  • GLOBAL_INTELLIGENCE
  • +
  • USER_DEFINED
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cccaRiskLevelint-The severity level of the threat actors associated with the C&C servers +
    +
  • 1
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientFlagstring-Whether the client is a source or destination +
    +
  • dst
  • +
  • src
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientGroupstring-The client IP network group +
    +
  • myCompany
  • +
  • myGroup
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
clientIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The endpoint IP address10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientMACstring-The client MAC address00-00-00-ff-ff-ff +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientPortintPortThe client port number5566 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cntstring-The total number of logs +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
compressedFileHashstringFileSHA1The SHA-1 of the decompressed archive +
    +
  • 6E2ECB34B7798E179CC704111FB9733FBAAD5ACA
  • +
  • FA71B59F35F0EE44D27F74917EF5A0DA2797E80B
  • +
  • 14D2302172EB81465CE12E01361AE24CDE170F7B
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileHashSha256stringFileSHA2The SHA-256 of the compressed suspicious file +
    +
  • 60C7C5924DD09F7C6B150120FB92DCEE00AE82DB75C7402FA4D9152CF487A94F
  • +
  • 482FFC4F87B78C3C7073983CF65B593D9F13F0A3D6DC54B4A3F616F79838F3CE
  • +
  • 68C0126D9B4B0FC32DE181D0D67DA8FE82E23745F6023317D5E053B6F6ED26CF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
compressedFileNamestringFileNameThe file name of the compressed file +
    +
  • /proc/32058/fd/150
  • +
  • NONAMEFL
  • +
  • /proc/10006/fd/30
  • +
  • VirusActionSample/RPF2_OtherMalwareSample-other.exe
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
compressedFileSizestring-The file size of the decompressed archive file +
    +
  • 0
  • +
  • 265314
  • +
  • 175864
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
compressedFileTypestring-The file type of the decompressed archive file +
    +
  • EXE
  • +
  • JAVA
  • +
  • PDF
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
correlationCatstring-The correlation category +
    +
  • Suspicious Traffic
  • +
  • Authentication
  • +
  • Reconnaissance
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cvestring-The CVE identifier +
    +
  • MS17-010
  • +
  • CVE-2021-45046
  • +
  • CVE-2021-44228
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
cvesdynamic-The CVEs associated with this filter +
    +
  • CVE-2014-3567
  • +
  • CVE-2016-6304
  • +
  • CVE-2011-1385
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data0string-The value of the DDI Correlation log +
    +
  • 1
  • +
  • USR_SUSPICIOUS_IP.UMXX
  • +
  • USR_SUSPICIOUS_URL.UMXX
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data0Namestring-The name of the DDI Correlation log +
    +
  • Malware Name
  • +
  • Attacked this IP
  • +
  • IP Address under Attack
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data1string-The Deep Discover Inspector correlation log metadata10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data1Namestring-The name of the DDI Correlation log +
    +
  • Port Used
  • +
  • Malicious File Transferred To This IP Address
  • +
  • Malware Server IP Address
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data2string-The value of the DDI Correlation log +
    +
  • 1
  • +
  • 10003
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data2Namestring-The name of the DDI Correlation log +
    +
  • Number of Malware Files Downloaded
  • +
  • Protocol
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data3string-The value of the DDI Correlation log +
    +
  • 1
  • +
  • 10.10.10.10
  • +
  • 23903
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
data4string-The value of the DDI Correlation log10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dceHash1string-The Trend Micro Threat Mitigation Server requires the log, but the Trend Micro Threat Mitigation Server is EOL.0 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dceHash2string-The Trend Micro Threat Mitigation Server requires the log, but the Trend Micro Threat Mitigation Server is EOL.0 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListFileHashstringFileSHA1The SHA-1 of the Virtual Analyzer Suspicious Object +
    +
  • 746C4D6048A409F33446463B28CA21CB2C5DD941
  • +
  • DAA66CE3C1F08144885BB0E99837030C5231DE60
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListFileHashSha256string-The SHA-256 of User-Defined Suspicious Object757E5C8823CAA7406030A7E26AED2A2C95D16F69C5A14C884C8CAA72A0C001C3 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListHoststringDomainNameThe domain of the Virtual Analyzer Suspicious Object +
    +
  • www.example.dns01.com
  • +
  • example.com
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the Virtual Analyzer Suspicious Object10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListRequeststring-Block list event request +
    +
  • *
  • +
  • test.url.com
  • +
  • https://example.com:443/gfx/flags/ua.png
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
denyListTypestring-Block list type +
    +
  • Deny List URL
  • +
  • Deny List File SHA1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
deviceDirectionstring-Device Direction. If the source IP is in the internal network (the network monitored by Deep Discovery Inspector) it is tagged as outbound. All other cases are inbound. Internal-to-internal is also tagged as outbound. +
    +
  • outbound
  • +
  • inbound
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
+
deviceGUIDstring-The GUID of the agent which reported the detection +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
deviceGUIDstring-The non-endpoint object such as a network appliance11111111-1111-1111-1111-111111111111 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
deviceMacAddressstring-The device mac address +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
devicePayloadIdstring-The device payload ID +
    +
  • 0:14343219::F:S
  • +
  • 0:94174860::F:
  • +
  • 0:9665982::F:
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
deviceRiskConfidenceLevelint-The confidence level of device risk- +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dhoststringDomainNameThe destination hostname10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
directionstring-The object transfer directionDownload +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dmacstring-The MAC address of the destination IP (dest_ip) +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
dnsQueryTypestring-The record type requested by the DNS protocolA +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
domainNamestringDomainNameThe detected domain name +
    +
  • http://10.10.10.10
  • +
  • example.domain.com
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
+
dOSNamestring-The destination host OS +
    +
  • Windows
  • +
  • Windows 10
  • +
  • Android
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstGroupstring-The group name defined by the administrator of the destination +
    +
  • Default
  • +
  • Data Center Services DL_Deployed Block
  • +
  • Rede Wifi Visitantes-Pacientes
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
dstZonestring-The network zone defined by the destination administrator +
    +
  • 1
  • +
  • 0
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
duserdynamicEmailRecipientThe email recipient +
    +
  • (no user)
  • +
  • SYSTEM
  • +
  • SYSTEM
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
duserdynamicEmailRecipientThe email recipientsample_email@trendmicro.com +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dUser1stringUserAccountThe latest sign-in user of the destinationuser\example +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dvcdynamic-The IP address of the Deep Discover Inspector appliance10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dvcdynamic-The IP address of the Deep Discovery Inspector or Virtual Network Sensor appliance10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dvchoststring-The computer which installed the Trend Micro product +
    +
  • CU-PRO1-9039-2
  • +
  • LTPF32PMNN
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dvchoststring-The network device hostname +
    +
  • my-company-xns
  • +
  • my-ddi
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
eventClassstring-The event category +
    +
  • Suspicious Traffic
  • +
  • Authentication
  • +
  • Reconnaissance
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdstring-The event ID +
    +
  • 200139
  • +
  • 200140
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The name of the log event +
    +
  • SWG_ACTIVITY_LOG
  • +
  • FIREWALL_ACTIVITY_LOG
  • +
  • VPC_ACTIVITY_LOG
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
eventSubClassstring-The category of sub-event class +
    +
  • DNS
  • +
  • Port Mis-use
  • +
  • Port Scanning
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
eventTimereal-The time the agent or product detected the event1657135700000 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
fileExtstring-The file extension of the suspicious file +
    +
  • .lnk
  • +
  • .exe
  • +
  • .EXE
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that violated the policy1e15bf99022a9164708cebb3eace8fd61ad45cba +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file that violated the policyba9edecdd09de1307714564c24409bd25508e22fe11c768053a08f173f263e93 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileNamestring +
    +
  • FileName
  • +
  • FileFullPath
  • +
+
The name of the file that violated the policyword.doc +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
filePathstringFileFullPathThe file path without the file name +
    +
  • security
  • +
  • /var/log/audit/audit.log
  • +
  • application
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
filePathNamestringFileFullPathThe file path with the file name +
    +
  • vss
  • +
  • spoolss
  • +
  • /etc/hosts
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
+
fileSizestring-The file size of the suspicious file +
    +
  • 0
  • +
  • 1255856
  • +
  • 1237880
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileSizestring-The size of the file that is violating the policy12134 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileTypestring-The file type of the suspicious file +
    +
  • EXE
  • +
  • LNK
  • +
  • MIME
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileTypestring-The type of file which is violating the policyMicrosoft Words +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
filterRiskLevelstring-The top level filter risk of the event +
    +
  • info
  • +
  • low
  • +
  • medium
  • +
+
+
    +
  • ALL
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
firmalwaredynamic-The firmware version of Deep Discover Inspector +
    +
  • 2017-12-01 15:05:07-05:00 3.83.1170 5.0.1555
  • +
  • 2020-11-13 18:04:29-05:00 5.0.1555 5.5.1200
  • +
  • 2020-11-13 18:43:30-05:00 5.5.1200 5.7.1178
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
flowIdstring-The network analysis flow ID6837014561409730558 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ftpTransdynamic-The transaction information of the FTP protocolNone +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
hasdtasresstring-Whether the log contains a report from Virtual Analyzer +
    +
  • No
  • +
  • Yes
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
heurFlagint-Whether it has an Advanced Threat Scan Engine detection +
    +
  • 1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The computer name of the client host (The hostname from the suspicious URL detected by Deep Discovery Inspector) +
    +
  • Let's Encrypt
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The host nameNJ-EFFY-ZHAO1 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
hostSeverityint-The severity of the threat (specific to the interestedIp) +
    +
  • 1
  • +
  • 2
  • +
  • 4
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
hotFixdynamic-The applied Deep Discover Inspector hotfix version +
    +
  • 2021-07-22 15:08:01+08:00 Hotfix 1042 hfb1042 Apply
  • +
  • 2021-12-22 09:03:42-06:00 Hotfix 1211 hfb1211 Apply
  • +
  • 2022-03-30 13:16:28-07:00 Hotfix 1218 hfb1218 Apply
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpLocationstringURLThe HTTP location headerwww.google.com.tw +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpRefererstringURLThe HTTP referer +
    +
  • http://172.16.58.233/
  • +
  • http://example/page1/
  • +
  • https://www.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
httpRefererstringURLThe HTTP referrer headerwww.google.com.tw +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpXForwardedForstring-The HTTP X-Forwarded-For header10.10.10.10, 10.10.10.11, 10.10.10.12 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpXForwardedForGroupstring-The X-Forwarded-For IP network group +
    +
  • myCompany
  • +
  • myGroup
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
httpXForwardedForIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The x-forwarded-for IP used by the network appliance10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
httpXForwardedForPortint-The patched HTTP server port when the network appliance selects an x-forwarded-for IP address to use65535 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
interestedGroupstring-The network group associated with the user-defined source IP or destination IP +
    +
  • Default
  • +
  • Rede DATACENTER Lumen/FORTIGATE - AD ESTACIO CORP
  • +
  • Data Center Services DL_Deployed Block
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
interestedHoststringDomainNameThe endpoint hostname (For example, if an intranet host accesses a suspicious internet host, the intranet host is the "peerHost" and the internet host is the "interestedHost") +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • es-dtc-w-dc02.example.corp
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
interestedIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the interestedHost10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
+
interestedMacAddressstring-The MAC address identified as the log owner's +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
+
ircChannelNamestring-The IRC channel name +
    +
  • ManageEngine
  • +
  • unknown
  • +
  • Global Product Delivery Group
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ircUserNamestring-The IRC user name +
    +
  • R3
  • +
  • ManageEngineCA
  • +
  • DigiCert TLS RSA SHA256 2020 CA1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
isHiddenstring-Whether the detection log generated a grey rule matchYes +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
ja3Hashstring-The fingerprint of an SSL/TLS client application as detected via a network sensor or device +
    +
  • 72a589da586844d7f0818ce684948eea
  • +
  • cd08e31494f9531f560d64c695473da9
  • +
  • 6dca00d8741247e245e4f2a632f1e62b
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ja3Hashstring-The JA3 hash478e74fad764c966f19c5232c7cdfc5a +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ja3sHashstring-The fingerprint of an SSL/TLS server application as detected via a network sensor or device +
    +
  • e54965894d6b45ecb4323c7ea3d6c115
  • +
  • ec74a5c51106f0419184d0dd08fb05bc
  • +
  • ba1b42efc7dc57bb43bf81de59791c1b
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
ja3sHashstring-The JA3S hash6d37fb1b3306d6e9f875650d8eb74b4f +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
mailMsgSubjectstringEmailSubjectThe email subject +
    +
  • FW. mail subject
  • +
  • ManageEngine
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
mailMsgSubjectstringEmailSubjectThe email subjecttest +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
malFamilystring-The threat family +
    +
  • EQUATED
  • +
  • STARTER
  • +
  • 0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
malTypestring-The risk type for Network Content Correlation Engine rules +
    +
  • OTHERS
  • +
  • MALWARE
  • +
  • Others
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • File Security
  • +
  • Trend Vision One Container Security
  • +
+
malTypeGroupstring-The risk type group for NCCE (Network Content Correlation Engine) rules. This field comes from NCCP (Network Content Correlation Pattern) rule type definitions. +
    +
  • Others
  • +
  • Malware
  • +
  • Spyware
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • File Security
  • +
+
mimeTypestring-The MIME type or content type of the response bodytext/html +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
mitigationTaskIdstring-The unique ID to identify the mitigation request +
    +
  • 09dcd06f-2f9c-4bab-8114-f823620fecb6
  • +
  • 0ed72c3c-05af-4c16-b2c4-789eaeccb944
  • +
  • 0f29cfc3-954a-4fd9-954e-bf14f7253d20
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
mitreMappingdynamic-The MITRE tags +
    +
  • T1090 (TA0011)
  • +
  • T1071 (TA0011)
  • +
  • T1071.001 (TA0011)
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
mitreVersionstring-The MITRE version +
    +
  • v9
  • +
  • v6
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
+
msgIdstringEmailMessageIDThe internet message ID +
    +
  • 66.6.00.0006
  • +
  • example.test.com
  • +
  • dameware1svr
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
msgIdstringEmailMessageIDThe service provider message ID<sample_email@trendmicro.com> +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
objectIpsdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address resolved by the DNS protocol10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
overSslstring-Whether the event was triggered by an SSL decryption stream (Displayed only when SSL Inspection is supported) +
    +
  • Not over SSL/TLS
  • +
  • 0
  • +
  • Over SSL/TLS
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
+
overSslstring-SSL protocol connectionYES +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
pAttackPhasestring-The category of the primary Attack Phase +
    +
  • Lateral Movement
  • +
  • Point of Entry
  • +
  • Asset and Data Discovery
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
pcapUUIDstring-The PCAP file UUID +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
pCompstring-The component that made the detection +
    +
  • CAV
  • +
  • NCIE
  • +
  • TMUFE
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
peerEndpointGUIDstring-The endpoint GUID of the agent peer host +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • TippingPoint Security Management System
  • +
+
peerGroupstring-The peer IP group +
    +
  • Default
  • +
  • Rede DATACENTER Lumen/PALOALTO VPNSSL - VPN CLIENT
  • +
  • UHS
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
peerHoststringDomainNameThe hostname of peerIp +
    +
  • dns.google
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
peerIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of peerHost10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-The product name +
    +
  • Secure Web Gateway
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
potentialRiskstring-The tag if it's a potential risk according to heuristics +
    +
  • 1
  • +
  • 0
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
ratingstring-The credibility level +
    +
  • Safe
  • +
  • Unknown
  • +
  • Dangerous
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawDataStrstring-The JSON string that contains additional information +
    +
  • {"TLS version": "0x0303", "Cipher Suite": "0xc030"}
  • +
  • {"Scanned ports": "23, 80, 443"}
  • +
  • {"HTTP Content-Type": "application/hal+json", "HTTP Content-Body": "{\\"_links\\": {\\"type\\": {\\"href\\": \\"http://10.10.10.10/rest/type/node/INVALID_VALUE\\"}}, \\"type\\": {\\"target_id\\": \\"article\\"}, \\"title\\": {\\"value\\": \\"My Article\\"}, \\"body\\": {\\"value\\": \\"\\"}}"}
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Vision One Container Security
  • +
  • Network Sensor
  • +
+
rawDataStrstring-The raw data string that contains additional information[{ "oid": "1.2.3.4", "value_type": 4, "value": "MANUFACTURER:SAMPLE\ nMODEL:SAMPLE C1234", "parse": 1}] +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawDstIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP without replacement10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawDstPortintPortThe destination port number without replacement33186 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawSrcIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP without replacement10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rawSrcPortintPortThe source port number without replacement80 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
reportGUIDstring-The GUID for Workbench to request report page data +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • File Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
reqAppVersionstring-The client application version numberSSH-2.0-OPENSSH_9.0 +
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
reqDataSizestring-The data volume transmitted over the transport layer by the client (in bytes)15688 +
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
reqScannedBytesstring-The data volume transmitted by the client (in bytes)4655 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requeststringURLThe destination URL that the user is accessing +
    +
  • https://google.com/
  • +
  • https://api/example/v1/testit
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestClientApplicationstring-The protocol user agent information +
    +
  • Microsoft-Delivery-Optimization/10.0
  • +
  • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
  • +
  • example Software GmbH
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
+
requestClientApplicationstring-The HTTP user agentMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestDatestring-The HTTP date headerFri, 20 Oct 2017 06:02:09 GMT +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestHeadersstring-All HTTP headers without sensitive informationHost: 10.10.10.10:8080 +User-Agent: curl/7.78.0 +Accept: */* + +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestMethodstring-The network protocol request methodPOST +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestMimeTypestring-The type of request contentapplication/json; charset=utf-8 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestsdynamicURLThe URLs of the requestwww.google.com.tw +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
resolvedUrlGroupstring-The IP address FQDN network group +
    +
  • myCompany
  • +
  • myGroup
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
resolvedUrlIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the FQDN10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
resolvedUrlPortintPortThe HTTP server port443 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respAppVersionstring-The server application version numberSSH-2.0-OPENSSH_8.7 +
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
respArchFilesdynamic-The file information extracted from files detected in response directionNone +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respCodestring-The network protocol response code +
    +
  • 200
  • +
  • 25
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respDataSizestring-The data volume transmitted over the transport layer by the server (in bytes)7856 +
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
respDatestring-The HTTP response date headerFri, 20 Oct 2017 06:02:09 GMT +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respFileHashstringFileSHA1The SHA-1 of the file detected in the response directionf17d9c55dea88f9aec8f74363f01e918cffb4142 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respFileHashSha256stringFileSHA2The SHA-256 of the file detected in the response direction5ad4396d67f0c9d54572f051e28e9e62f4010c269a953d25259b17ad5fab4fd5 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respFileTypestring-The file type detected in the response directionPKZIP +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respHeadersstring-All HTTP response headers without sensitive informationAccept-Ranges: bytes +Content-Length: 68 +Content-Type: - text/plain; charset=utf-8 +Last-Modified: Thu, 19 Aug 2021 06:23:54 GMT +Date: Thu, 19 Aug 2021 06:24:00 GMT + +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respMethodstring-The response method +
    +
  • KRB_ERROR
  • +
  • AS_REP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
respScannedBytesstring-The data volume transmitted by the server (in bytes)6654 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
riskLevelstring-The risk level +
    +
  • 1
  • +
  • high
  • +
  • No Risk
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rozRatingstring-The VA overall rating +
    +
  • 0
  • +
  • -1
  • +
  • 1
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
rtDatestring-The date of the log generation1655337600000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtHourint-The hour of the log generation +
    +
  • 9
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
rtWeekDaystring-The weekday of the log generation +
    +
  • Monday
  • +
  • Tuesday
  • +
  • Friday
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
ruleIdint-The rule ID +
    +
  • 1002795
  • +
  • 1003802
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Network Security
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
sAttackPhasestring-The category of the second Attack Phase +
    +
  • Lateral Movement
  • +
  • Command and Control Communication
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
scanTsstring-The mail scan time- +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
scoreint-The Web Reputation Services URL rating +
    +
  • 71
  • +
  • 81
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
senderGUIDstring-The sender GUID +
    +
  • 346648FC-9862-D2F0-F94C-FAB1A838ABD7
  • +
  • 36E5239E-EEBA-0100-C10E-C057E0455E1D
  • +
  • 9606BBD5-38A7-9024-83C8-9C88A2AF90CC
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
+
senderIpdynamic-The sender IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
+
serverGroupstring-The server IP network group +
    +
  • myCompany
  • +
  • myGroup
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
serverIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The server IP address10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
serverMACstring-The server MAC address00-00-00-ff-ff-ff +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
serverPortintPortThe server port number443 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sessionEndstring-The session end time, in seconds1575462989 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sessionEndReasonstring-The reason why a session was terminated +
    +
  • tcp-fin
  • +
  • tcp-rst-from-server
  • +
+
+
    +
  • Network Sensor
  • +
  • Trend Micro Deep Discovery Inspector
  • +
+
sessionStartstring-The session start time (in seconds)1575462989 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
severityint-The severity of the event +
    +
  • 2
  • +
  • 4
  • +
  • 6
  • +
  • 8
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
shoststringDomainNameThe source hostname +
    +
  • dns.google
  • +
  • sw_us-east-1a_10-124-17-69
  • +
  • sw_us-east-1c_10-124-21-139
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Network Security
  • +
+
smacstring-The source MAC address +
    +
  • 00:11:22:33:44:55
  • +
  • 66:77:88:99:AA:BB
  • +
  • CC:DD:EE:FF:00:11
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
sOSNamestring-The source OS +
    +
  • Windows
  • +
  • Windows 10
  • +
  • Windows XP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcGroupstring-The group named defined by the source administrator +
    +
  • Default
  • +
  • Rede DATACENTER example/example - AD example CORP
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Mobile Network Security
  • +
+
srcZonestring-The network zone defined by the source administrator +
    +
  • 1
  • +
  • 0
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertCommonNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The subject common namesettings-win.data.microsoft.com +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertCommonNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The certificate common name*.www.sample.com +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertFingerprintstring-The certificate fingerprint3914af80223c833f26df001cbf342eff8a31aba1 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertIssuerstring-The issuer of the certificate/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance Server CA +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertIssuerCommonNamestring-The issuer common nameMicrosoft Azure TLS Issuing CA 05 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertIssuerOrgNamestring-The issuer organization nameMicrosoft Corporation +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertOrgNamestring-The subject organization nameMicrosoft +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertSANsdynamic-The Subject Alternative Name of the certificate +
    +
  • *.www.sample.com
  • +
  • add.my.sample.com
  • +
  • au.sample.com
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertSerialNumberstring-The certificate serial number0888b1ad2a593310593f47565a5a5a4a +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertValidFromstring-The certificate validity start time2014-11-21T02:43:28 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sslCertValidUntilstring-The certificate validity end time2018-11-21T02:43:28 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
statusstring-The network analysis flow session status2 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
suidstringUserAccountThe user name or IP address (IPv4) +
    +
  • Sample User Name
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
suserdynamicEmailSenderThe email sendersample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Email Sensor
  • +
+
suserstringEmailSenderThe email sendersample_email@trendmicro.com +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sUser1stringUserAccountThe latest sign-in user of the source +
    +
  • example\admin
  • +
  • example.us.com\account
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
tacticIddynamicTacticThe list of MITRE tactic IDs +
    +
  • TA0011
  • +
  • TA0008
  • +
  • TA0001
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
+
tagsdynamic +
    +
  • Technique
  • +
  • Tactic
  • +
+
The detected technique ID based on the alert filter +
    +
  • MITREV9.T1090
  • +
  • MITRE.T1071
  • +
  • MITREV9.T1059.001
  • +
+
+
    +
  • ALL
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
targetSharestringFileFullPathFor HTTPS protocol: Subject State or Province Name; For SMB protocol: Shared folder +
    +
  • 3MHIS
  • +
  • NETLOGON
  • +
  • CA
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
techniqueIddynamicTechniqueTechnique ID detected by the product agent base on a detection rule- +
    +
  • TXOne StellarOne
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
threatNamestring-The threat name +
    +
  • Malicious_CnC_access_on_UDP_blocked
  • +
  • Malicious_CnC_access_on_TCP_blocked
  • +
  • Other protected file
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
threatNamesdynamic-The associated threats +
    +
  • HM_GERAL.MIP00000001
  • +
  • HM_JADTRE.MIP00000001
  • +
  • VAN_BOT.UMXX
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
threatTypestring-The log threat type +
    +
  • 2
  • +
  • 99
  • +
  • 5
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
tlsJA3Fingerprintstring-The JA3 fingerprint- +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
tlsJA3SFingerprintstring-The raw JA3S771,157,65281-15 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
tlsSelectedCipherstring-The selected cipher of the TLS protocolc02f +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
urlCatdynamic-The requested URL category +
    +
  • Untested
  • +
  • 158
  • +
  • Web Advertisement
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
userDomainstring +
    +
  • DomainName
  • +
  • AccountDomain
  • +
+
Active directory domain, domain of username for logging in TMAS adminportal adminportaltrendmicro.com +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
vLANIdint-The virtual LAN ID- +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 242 +- **Layer:** Network +- **Product:** Trend Micro Deep Discovery Inspector + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/Trend Micro Web Security.md b/pages/Network/Trend Micro Web Security.md new file mode 100644 index 0000000..9abdb4f --- /dev/null +++ b/pages/Network/Trend Micro Web Security.md @@ -0,0 +1,630 @@ +--- +layout: default +title: Trend Micro Web Security - Network +--- + +# Trend Micro Web Security +**Layer:** Network + +This documentation provides detailed information about all fields available for Trend Micro Web Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
applicationstring-The name of the requested application +
    +
  • HyperText Transfer Protocol
  • +
  • DoubleClick
  • +
  • The Secure HyperText Transfer Protocol
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Apex One as a Service
  • +
+
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
policyNamestring-The name of the triggered policy +
    +
  • Steelcase
  • +
  • Cabot
  • +
  • Tigre - Medium Policy
  • +
  • apiPostedPolicy
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
principalNamestring-The user principal name used to sign in to the proxysample_email@trendmicro.com +
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
profilestring-The name of the triggered Threat Protection template or Data Loss Prevention profile +
    +
  • Primary Protection Rule
  • +
  • Multibak Scaner Threat
  • +
  • default
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
requestBasestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The domain of the request URL +
    +
  • weather.service.msn.com
  • +
  • test.domain.com
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
senderstring-The roaming users or the gateway where the web traffic passed +
    +
  • test user
  • +
  • VE C&W - 10.10.10.10
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
urlCatdynamic-The requested URL category +
    +
  • Untested
  • +
  • 158
  • +
  • Web Advertisement
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
userDepartmentstring-User department +
    +
  • Operations
  • +
  • BANCA CONSTRUCCION
  • +
  • CONTACT CENTER
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
userDomainstring +
    +
  • EndpointName
  • +
  • DomainName
  • +
  • AccountDomain
  • +
+
The user domain +
    +
  • example.com.pa
  • +
  • DOMAIN
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 17 +- **Layer:** Network +- **Product:** Trend Micro Web Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/Zero Trust Secure Access - Internet Access.md b/pages/Network/Zero Trust Secure Access - Internet Access.md new file mode 100644 index 0000000..a65e339 --- /dev/null +++ b/pages/Network/Zero Trust Secure Access - Internet Access.md @@ -0,0 +1,1961 @@ +--- +layout: default +title: Zero Trust Secure Access - Internet Access - Network +--- + +# Zero Trust Secure Access - Internet Access +**Layer:** Network + +This documentation provides detailed information about all fields available for Zero Trust Secure Access - Internet Access. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
actstring-The action +
    +
  • Allow
  • +
  • Block
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
applicationstring-The name of the requested application +
    +
  • HyperText Transfer Protocol
  • +
  • DoubleClick
  • +
  • The Secure HyperText Transfer Protocol
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Apex One as a Service
  • +
+
applicationstring-The name of the requested application +
    +
  • Facebook
  • +
  • wiki
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
authTypestring-The authorization type +
    +
  • Cookie JWT
  • +
  • No Auth
  • +
+
Zero Trust Secure Access - Internet Access
authTypestring-The authentication method +
    +
  • {'Cookie JWT': 'Authenticated by browser cookie with JWT token'}
  • +
  • {'Agent JWT': 'Authenticated by Secure Access Module with JWT token'}
  • +
  • {'IP': 'Authentication bypassed by private IP.'}
  • +
  • {'No Auth': 'No authentication.'}
  • +
+
Zero Trust Secure Access - Internet Access
clientIpdynamic-The IP addresses of the source10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
clientIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The endpoint IP address10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
clientProtocolstring-The client protocolHTTP/1.1Zero Trust Secure Access - Internet Access
clientTlsstring-The transport layer security of the clientTLS 1.2Zero Trust Secure Access - Internet Access
cloudAppCatstring-The category of the event in Cloud Reputation Service +
    +
  • All
  • +
  • Online Service
  • +
  • Application Suite
  • +
  • Business Intelligence and Analytics
  • +
  • Cloud Computing Platform
  • +
+
Zero Trust Secure Access - Internet Access
cloudAppCatstring-The category of the event in Cloud Reputation Service +
    +
  • All
  • +
  • Online Service
  • +
  • Application Suite
  • +
  • Business Intelligence and Analytics
  • +
  • Cloud Computing Platform
  • +
+
Zero Trust Secure Access - Internet Access
contentEncodingstring-The content encoding of the request or the responsegzipZero Trust Secure Access - Internet Access
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
detectionTypestring-The traffic detection type +
    +
  • No matched Zero Trust Secure Access rule
  • +
  • Missing or invalid client certificate
  • +
  • Untrusted server certificate
  • +
  • Zero Trust Secure Access
  • +
  • HTTPS inspection exception
  • +
  • HTTPS inspection failure
  • +
  • HTTPS bypass at inspection failure
  • +
  • Approved URLs
  • +
  • Blocked URLs
  • +
  • Private IP address access
  • +
  • Web Reputation
  • +
  • URL Filtering
  • +
  • Restricted file type
  • +
  • Restricted MIME type
  • +
  • Restricted file extension type
  • +
  • Anti-malware scan
  • +
  • File scan exception
  • +
  • Predictive Machine Learning
  • +
  • Botnet
  • +
  • Application Control
  • +
  • Virtual Analyzer submission
  • +
  • Tenancy Restriction
  • +
  • Suspicious Object Blocked List
  • +
  • Data Loss Prevention
  • +
  • Ransomware
  • +
  • Risk Control
  • +
  • AI Service Risk Control
  • +
  • Non-compliant device
  • +
  • AI Service Access
  • +
  • AI Service Sensitive Data Prevention
  • +
  • AI Service Prompt Injection
  • +
  • AI Service Improper Answer
  • +
  • AI Service Malicious URL Answer
  • +
  • AI Service File Upload Detection
  • +
  • AI Service Rate Limiting
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
deviceGUIDstring-The GUID of the agent which reported the detection +
    +
  • 00000000-0000-0000-0000-000000000000
  • +
  • 11111111-1111-1111-1111-111111111111
  • +
  • 22222222-2222-2222-2222-222222222222
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
deviceGUIDstring-The non-endpoint object such as a network appliance11111111-1111-1111-1111-111111111111 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dststring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP address (dstaddr)10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
dstLocationstring-The destination countryJPZero Trust Secure Access - Internet Access
dstLocationstring-The destination countryJPZero Trust Secure Access - Internet Access
durationstring-The time it took the scanner to complete the scan, in milliseconds1599465660123Zero Trust Secure Access - Internet Access
e2eLatencystring-The end-to-end traffic latency time, in milliseconds10000Zero Trust Secure Access - Internet Access
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointGuidstringEndpointIDThe device GUID +
    +
  • 11111111-1111-1111-1111-111111111111
  • +
  • DSP84573ULLJHM5GK2R7
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe host name of the device on which the event was detected +
    +
  • my_machine
  • +
  • jeremy-mbp
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The name of the log event +
    +
  • SWG_ACTIVITY_LOG
  • +
  • FIREWALL_ACTIVITY_LOG
  • +
  • VPC_ACTIVITY_LOG
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
eventSubNamestring-The event type sub-name +
    +
  • IPS Detection
  • +
  • Personal Firewall
  • +
  • Attack Discovery
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
eventSubNamestring-The Zero Trust Secure Access - Internet Access cloud app action or the Palo Alto Networks firewall log sub-type +
    +
  • OneDrive download file
  • +
  • start
  • +
  • end
  • +
  • drop
  • +
  • deny
  • +
+
Zero Trust Secure Access - Internet Access
eventTimereal-The time the agent or product detected the event1657135700000 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
failedHTTPSInspectionbool-HTTPS traffic inspection failureTrueZero Trust Secure Access - Internet Access
fileHashstringFileSHA1The SHA-1 of the file that triggered the rule or policy +
    +
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • +
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • +
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
fileHashstringFileSHA1The SHA-1 of the file that violated the policy1e15bf99022a9164708cebb3eace8fd61ad45cba +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file (fileName) +
    +
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • +
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • +
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileHashSha256stringFileSHA2The SHA-256 of the file that violated the policyba9edecdd09de1307714564c24409bd25508e22fe11c768053a08f173f263e93 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileNamestring +
    +
  • FileName
  • +
  • FileFullPath
  • +
+
The name of the file that violated the policyword.doc +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileSizestring-The file size of the suspicious file +
    +
  • 0
  • +
  • 1255856
  • +
  • 1237880
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Apex One as a Service
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
fileSizestring-The size of the file that is violating the policy12134 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
fileTypestring-The file type of the suspicious file +
    +
  • EXE
  • +
  • LNK
  • +
  • MIME
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
fileTypestring-The type of file which is violating the policyMicrosoft Words +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
isPrivateAppbool-Whether the requested application is private +
    +
  • True
  • +
+
Zero Trust Secure Access - Internet Access
isPrivateAppbool-Whether the requested application is private +
    +
  • True
  • +
+
Zero Trust Secure Access - Internet Access
logKeystring-The unique key of the event +
    +
  • 123e4567-e89b-12d3-a456-426614174000
  • +
  • 987f6543-21ba-43cd-9e8f-123456789abc
  • +
  • 456789ab-cdef-1234-5678-9abcdef01234
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
malNamestring-The name of the detected malware-Zero Trust Secure Access - Internet Access
mimeTypestring-The MIME type or content type of the response body +
    +
  • application/octet-stream
  • +
  • application/json; charset=utf-8
  • +
  • application/json
  • +
+
Zero Trust Secure Access - Internet Access
mimeTypestring-The MIME type or content type of the response bodytext/html +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
osNamestring-The host OS name +
    +
  • Linux
  • +
  • windows 10.0.22000
  • +
  • windows 10.0.19044
  • +
  • windows 10.0.19043
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Data Detection and Response
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
osNamestring-The host operating system name +
    +
  • Windows 10
  • +
  • macos 12.1
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-The product name +
    +
  • Secure Web Gateway
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
policyNamestring-The name of the triggered policy +
    +
  • Steelcase
  • +
  • Cabot
  • +
  • Tigre - Medium Policy
  • +
  • apiPostedPolicy
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
policyTemplatedynamic-The one-to-many data structure +
    +
  • policyName:Monitoreo All Files, template:Managed - All files
  • +
  • policyName:HSS DLP, template:All File Extension
  • +
  • India: Mobile Numbers
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
policyTemplatedynamic-The Data Loss Prevention template nameAustralia, New Zealand: Healthcare Template,Germany: Banking and Financial InformationZero Trust Secure Access - Internet Access
policyUuidstring-The UUID of the cloud access or risk control policy, or the hard-coded string that indicates the rule of the global blocked/approved URL list +
    +
  • 7937cb0b-e598-4c8f-a50f-65c32905ba3a
  • +
  • C!7c4433e3-5b2c-449f-b66e-ccaac006b6f1
  • +
  • 8d265639-7202-4455-b640-48683aa2b57d
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
principalNamestring-The user principal name used to sign in to the proxysample_email@trendmicro.com +
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
principalNamestringUserAccountThe User Principal Namesample_email@trendmicro.com +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
profilestring-The name of the triggered Threat Protection template or Data Loss Prevention profile +
    +
  • Primary Protection Rule
  • +
  • Multibak Scaner Threat
  • +
  • default
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
profilestring-The name of the triggered Threat Protection template or Data Loss Prevention profile triggered-Zero Trust Secure Access - Internet Access
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
pverstring-The product version1.0Zero Trust Secure Access - Internet Access
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requeststringURLThe destination URL that the user is accessing +
    +
  • https://google.com/
  • +
  • https://api/example/v1/testit
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestBasestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The domain of the request URL +
    +
  • weather.service.msn.com
  • +
  • test.domain.com
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requestBasestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The URL domain +
    +
  • www.facebook.com
  • +
  • gary.webserver64.com
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requestMethodstring-The network protocol request methodPOST +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestMimeTypestring-The type of request contentapplication/json; charset=utf-8 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestSizestring-The request length1324Zero Trust Secure Access - Internet Access
responseSizestring-The response length1324Zero Trust Secure Access - Internet Access
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
rtstring-The UTC timestamp1599465660 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
ruleNamestring-The name of the triggered cloud access rule +
    +
  • ETL_Access Rules_Web_Host
  • +
  • block_wiki_for_guest
  • +
  • BlockHighRiskTCPPortsFromInternet
  • +
  • unspecified
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • azv
  • +
+
scoreint-The WRS score81Zero Trust Secure Access - Internet Access
senderstring-The roaming users or the gateway where the web traffic passed +
    +
  • test user
  • +
  • VE C&W - 10.10.10.10
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
senderstring-The Zero Trust Internet Access gateway location +
    +
  • {'Public/Home network': 'The default cloud gateway.'}
  • +
  • {'Anything else': 'The pre-defined location name of cloud gateway or on-premises gateway.'}
  • +
+
Zero Trust Secure Access - Internet Access
serverProtocolstring-The version of the HTTP protocol between the Service Gateway and server/websiteHTTP/1.1 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
serverRespTimestring-The time the server took to respond to the request, in milliseconds1599465660123Zero Trust Secure Access - Internet Access
serverTlsstring-The TLS version between the Service Gateway and server/websiteTLS 1.2 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP address (srcaddr)10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
srcLocationstring-The source countryJPZero Trust Secure Access - Internet Access
srcLocationstring-The source countryJPZero Trust Secure Access - Internet Access
suidstringUserAccountUser name or mailbox +
    +
  • root
  • +
  • US EXAMPLE\TEST
  • +
  • sample_email@trendmicro.com
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
suidstringUserAccountThe user name or IP address (IPv4) +
    +
  • Sample User Name
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
tlsJA3Fingerprintstring-The JA3 fingerprint- +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
trafficTypestring-The Zero Trust Internet Access gateway service mode +
    +
  • {'Proxy': 'Zero Trust Internet Access On-Premises Gateway with forward proxy mode configured'}
  • +
  • {'Forward': 'Zero Trust Internet Access On-Premises Gateway with forward proxy mode and port forwarding configured'}
  • +
  • {'ICAP': 'Zero Trust Internet Access On-Premises Gateway with ICAP configured'}
  • +
  • {'Reverse': 'Zero Trust Internet Access On-Premises Gateway with reverse proxy mode configured'}
  • +
  • {'Proxy (xx)': 'Cloud Gateway in xx PoP with forward proxy mode'}
  • +
  • {'Forward (xx)': 'Cloud Gateway in xx PoP with forward proxy mode for port forwarding'}
  • +
+
Zero Trust Secure Access - Internet Access
urlCatdynamic-The requested URL category +
    +
  • Untested
  • +
  • 158
  • +
  • Web Advertisement
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
urlCatstring-The URL categorySocial NetworkingZero Trust Secure Access - Internet Access
userAgentstring-The user agent or the agent through which the request was made +
    +
  • Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0)
  • +
  • Chrome/74.0.3729.108 Safari/537.36
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
userDepartmentstring-User department +
    +
  • Operations
  • +
  • BANCA CONSTRUCCION
  • +
  • CONTACT CENTER
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
userDepartmentstring-The user department request methodSalesZero Trust Secure Access - Internet Access
userDomainstring +
    +
  • EndpointName
  • +
  • DomainName
  • +
  • AccountDomain
  • +
+
The user domain +
    +
  • example.com.pa
  • +
  • DOMAIN
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
+
userDomainstring +
    +
  • DomainName
  • +
  • AccountDomain
  • +
+
Active directory domain, domain of username for logging in TMAS adminportal adminportaltrendmicro.com +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 96 +- **Layer:** Network +- **Product:** Zero Trust Secure Access - Internet Access + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Network/Zero Trust Secure Access - Private Access.md b/pages/Network/Zero Trust Secure Access - Private Access.md new file mode 100644 index 0000000..36c09a0 --- /dev/null +++ b/pages/Network/Zero Trust Secure Access - Private Access.md @@ -0,0 +1,1263 @@ +--- +layout: default +title: Zero Trust Secure Access - Private Access - Network +--- + +# Zero Trust Secure Access - Private Access +**Layer:** Network + +This documentation provides detailed information about all fields available for Zero Trust Secure Access - Private Access. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
actstring-The action +
    +
  • Allow
  • +
  • Block
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
applicationstring-The name of the requested application +
    +
  • HyperText Transfer Protocol
  • +
  • DoubleClick
  • +
  • The Secure HyperText Transfer Protocol
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Apex One as a Service
  • +
+
applicationstring-The name of the requested application +
    +
  • Facebook
  • +
  • wiki
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
clientIpdynamic-The IP addresses of the source10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
clientIpstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The endpoint IP address10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
companyNamestring-The company nameTrend MicroZero Trust Secure Access - Private Access
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
detectionTypestring-The traffic detection type +
    +
  • No matched Zero Trust Secure Access rule
  • +
  • Missing or invalid client certificate
  • +
  • Untrusted server certificate
  • +
  • Zero Trust Secure Access
  • +
  • HTTPS inspection exception
  • +
  • HTTPS inspection failure
  • +
  • HTTPS bypass at inspection failure
  • +
  • Approved URLs
  • +
  • Blocked URLs
  • +
  • Private IP address access
  • +
  • Web Reputation
  • +
  • URL Filtering
  • +
  • Restricted file type
  • +
  • Restricted MIME type
  • +
  • Restricted file extension type
  • +
  • Anti-malware scan
  • +
  • File scan exception
  • +
  • Predictive Machine Learning
  • +
  • Botnet
  • +
  • Application Control
  • +
  • Virtual Analyzer submission
  • +
  • Tenancy Restriction
  • +
  • Suspicious Object Blocked List
  • +
  • Data Loss Prevention
  • +
  • Ransomware
  • +
  • Risk Control
  • +
  • AI Service Risk Control
  • +
  • Non-compliant device
  • +
  • AI Service Access
  • +
  • AI Service Sensitive Data Prevention
  • +
  • AI Service Prompt Injection
  • +
  • AI Service Improper Answer
  • +
  • AI Service Malicious URL Answer
  • +
  • AI Service File Upload Detection
  • +
  • AI Service Rate Limiting
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dptintPortThe service destination port of the private application server (dstport)443 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dststring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP address (dstaddr)10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointGuidstringEndpointIDThe device GUID +
    +
  • 11111111-1111-1111-1111-111111111111
  • +
  • DSP84573ULLJHM5GK2R7
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe host name of the device on which the event was detected +
    +
  • my_machine
  • +
  • jeremy-mbp
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The name of the log event +
    +
  • SWG_ACTIVITY_LOG
  • +
  • FIREWALL_ACTIVITY_LOG
  • +
  • VPC_ACTIVITY_LOG
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
eventTimereal-The time the agent or product detected the event1657135700000 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
objectIdstring-The UUID of the object +
    +
  • 3
  • +
  • 2
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
objectIdstring-The UUID of the Zero Trust Secure Access private access application11111111-1111-1111-1111-111111111111Zero Trust Secure Access - Private Access
osNamestring-The host OS name +
    +
  • Linux
  • +
  • windows 10.0.22000
  • +
  • windows 10.0.19044
  • +
  • windows 10.0.19043
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Data Detection and Response
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
osNamestring-The host operating system name +
    +
  • Windows 10
  • +
  • macos 12.1
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
osVerstring-The OS version11 +
    +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Data Detection and Response
  • +
+
policyUuidstring-The UUID of the cloud access or risk control policy, or the hard-coded string that indicates the rule of the global blocked/approved URL list +
    +
  • 7937cb0b-e598-4c8f-a50f-65c32905ba3a
  • +
  • C!7c4433e3-5b2c-449f-b66e-ccaac006b6f1
  • +
  • 8d265639-7202-4455-b640-48683aa2b57d
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
policyUuidstring-The policy UUID11111111-1111-1111-1111-111111111111Zero Trust Secure Access - Private Access
principalNamestring-The user principal name used to sign in to the proxysample_email@trendmicro.com +
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
principalNamestringUserAccountThe User Principal Namesample_email@trendmicro.com +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requeststringURLThe destination URL that the user is accessing +
    +
  • https://google.com/
  • +
  • https://api/example/v1/testit
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
requestBasestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The domain of the request URL +
    +
  • weather.service.msn.com
  • +
  • test.domain.com
  • +
+
+
    +
  • Trend Micro Web Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requestBasestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The URL domain +
    +
  • www.facebook.com
  • +
  • gary.webserver64.com
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
rtstring-The Unix time of the log generation1656324260000 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
+
rtstring-The UTC timestamp1599465660 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
ruleNamestring-The name of the rule that triggered the event +
    +
  • Directory Server - Microsoft Windows Active Directory
  • +
  • Microsoft Windows Events
  • +
  • Microsoft Windows Security Events - 3
  • +
  • (T1234) New executable created (chmod)
  • +
  • Sensitive Files Upload to Personal Cloud
  • +
  • Multiple Sensitive Files Compression
  • +
  • Transfer Sensitive Files to Removable Storage
  • +
  • Move Multiple Sensitive Files to Central Location
  • +
  • Multiple Sensitive Files Modification
  • +
  • Multiple Sensitive Files Deletion
  • +
  • GEN_CCFR_OVERLAY_TEST.A
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
ruleNamestring-The name of the triggered cloud access rule +
    +
  • ETL_Access Rules_Web_Host
  • +
  • block_wiki_for_guest
  • +
  • BlockHighRiskTCPPortsFromInternet
  • +
  • unspecified
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • azv
  • +
+
ruleTypestring-The access rule type +
    +
  • udso
  • +
  • point of entry
  • +
  • unknown
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
ruleTypestring-The rule type which is applied to the trafficaccessZero Trust Secure Access - Private Access
ruleUuidstring-The signature UUID from the DV (Digital Vaccine) +
    +
  • 00000001-0001-0001-0001-000000007610
  • +
  • 00000001-0001-0001-0001-000000007120
  • +
  • 00000001-0001-0001-0001-000000017056
  • +
+
+
    +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
ruleUuidstring-The risk assessment and control design that is defined by Zero Trust Secure Access risk control rules11111111-1111-1111-1111-111111111111Zero Trust Secure Access - Private Access
serverProtocolstring-The version of the HTTP protocol between the Service Gateway and server/websiteHTTP/1.1 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
serverTlsstring-The TLS version between the Service Gateway and server/websiteTLS 1.2 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
sessionEndstring-The session end time, in seconds1575462989Zero Trust Secure Access - Private Access
sessionEndstring-The session end time, in seconds1575462989 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sessionStartstring-The session start time, in seconds1575462989Zero Trust Secure Access - Private Access
sessionStartstring-The session start time (in seconds)1575462989 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
sptintPortThe virtual port of the source assigned to the Secure Access Module (srcport)57763 +
    +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP address (srcaddr)10.10.10.10 +
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • XDR for Cloud - AWS VPC Flow Logs
  • +
  • azv
  • +
+
userAgentstring-The user agent or the agent through which the request was made +
    +
  • Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0)
  • +
  • Chrome/74.0.3729.108 Safari/537.36
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 52 +- **Layer:** Network +- **Product:** Zero Trust Secure Access - Private Access + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Others/Mobile Security.md b/pages/Others/Mobile Security.md new file mode 100644 index 0000000..2c3994b --- /dev/null +++ b/pages/Others/Mobile Security.md @@ -0,0 +1,1394 @@ +--- +layout: default +title: Mobile Security - Others +--- + +# Mobile Security +**Layer:** Others + +This documentation provides detailed information about all fields available for Mobile Security. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
actResultdynamic-The result of an action +
    +
  • Dropped
  • +
  • Successful
  • +
  • Accepted
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • Mobile Security
  • +
+
appDexSha256stringFileSHA2The app dex encoded using SHA-25608736EDDD3682AC26D9FD42DA2A20B0BADB5C85A5456A0AE85B52D60C564F290Mobile Security
appIsSystembool-Whether the app is a system appFalseMobile Security
appIsSystembool-Whether the app is a system appFalseMobile Security
appLabelstring-App nameMobile Security Virus Test ApplicationMobile Security
appLabelstring-The app name (if the subject is an app)Collection Nes GamesMobile Security
appOrSystemEventHashIdstring-The event object hash ID3859886410Mobile Security
appPkgNamestring-The app package namecom.example.app_pkg_name_fileMobile Security
appPkgNamestring-The app package name (if the subject is an app)com.ConsolesXX.CollectionNesGamesMobile Security
appPublicKeySha1stringFileSHA1The app public key (SHA-1)72080A6B4EB11105B28E31C4753BC91414500AD4Mobile Security
appPublicKeySha1stringFileSHA1The SHA-1 hash of the app public key (if the subject is an app)05FC638156219800DADAC48D8E621E0BCBD3C321Mobile Security
appSizestring-The app size (in bytes)28461Mobile Security
appSizestring-The app size (in bytes) if the subject is an app16906043Mobile Security
appVerCodeint-The app version code1Mobile Security
appVerCodestring-The app version code (if the subject is an app)0Mobile Security
detectionNamestring-The general name for the detection +
    +
  • Troj.Win32.TRX.XXPE50F13017
  • +
  • Troj.Win32.TRX.XXPE50FFF059
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Mobile Security
  • +
+
detectionTypestring-The detection type +
    +
  • 1
  • +
  • File
  • +
  • Process
  • +
  • net
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
+
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointGuidstringEndpointIDHost GUID of the endpoint on which the event was detected11111111-1111-1111-1111-111111111111Mobile Security
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe host name of the endpoint on which the event was detected +
    +
  • PHILIPSIBE09
  • +
  • WHAM6WK8XG2
  • +
  • MacBook-Pro-del-Meno
  • +
+
Mobile Security
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address of the endpoint on which the event was detected +
    +
  • 10.10.10.10
  • +
  • ::1
  • +
  • fe80::1
  • +
+
Mobile Security
endpointModelstring-Mobile device modelM2101K9GMobile Security
endpointModelstring-The endpoint device modelPixel 3 XLMobile Security
eventHashIdstring-The event hash ID +
    +
  • -8406473586387535914
  • +
  • 138486453338666581
  • +
  • -7909265752378976284
  • +
+
Mobile Security
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventIdint-Event type-Mobile Security
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubIdint-The access type +
    +
  • 2 - TELEMETRY_PROCESS_CREATE
  • +
  • 101 - TELEMETRY_FILE_CREATE
  • +
  • 204 - TELEMETRY_CONNECTION_CONNECT_OUTBOUND
  • +
+
Mobile Security
eventTimereal-The time the agent detected the event1657781088000Mobile Security
extraInfodynamic-The extra information about the app +
    +
  • N/A
  • +
  • Web Client Common
  • +
  • DCERPC Services
  • +
+
Mobile Security
firstSeenstring-The time when the event started (in milliseconds)1656355418449Mobile Security
lastSeenstring-The time when the event ended (in milliseconds)1656355418449Mobile Security
logonUserdynamicUserAccountThe logon user name +
    +
  • root
  • +
  • SISTEMA
  • +
  • oracle
  • +
+
Mobile Security
mailboxstring-The mailbox that is protected by Trend Microsample_email@trendmicro.com +
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Mobile Security
  • +
  • Email Sensor
  • +
+
majorVirusTypestring-The virus type +
    +
  • Virus
  • +
  • Suspicious Activity
  • +
  • Trojan
  • +
  • TROJ
  • +
+
+
    +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Mobile Security
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
  • File Security Storage
  • +
+
marsAccountstring-The account for Trend Micro Mobile Apps Reputation ServiceXDRv1Mobile Security
minorVirusTypestring-Minor virus type +
    +
  • RANSOMWARE
  • +
  • BANKER
  • +
  • CREDENTIAL
  • +
+
Mobile Security
objectAppBehaviorstring-The activity that occurred on the app +
    +
  • GRANTED_CAMERA_PERMISSION
  • +
  • APP_NO_ICON
  • +
  • APP_HIDE_ICON
  • +
+
Mobile Security
objectAppBehaviorAttrstring-The attributes of the app activityandroid.intent.action.BOOT_COMPLETEDMobile Security
objectAppDexSha256stringFileSHA2The SHA-256 hash of the app Dex valueC23A87B77B06442FD9AF9A80DD87191EDEADFAB766C862EBC592FE18063D0449Mobile Security
objectAppInstalledTimestring-The time of app installation (in milliseconds)1607935850Mobile Security
objectAppIsSystemAppbool-Whether the app is a system appTrueMobile Security
objectAppLabelstring-The app nameCollection Nes GamesMobile Security
objectAppPackageNamestring-The app package namecom.ConsolesXX.CollectionNesGamesMobile Security
objectAppPublicKeySha1stringFileSHA1The SHA-1 hash of the app public key05FC638156219800DADAC48D8E621E0BCBD3C321Mobile Security
objectAppSha256stringFileSHA2The SHA-256 hash of the app692BC8E6BC51807A24BEACC13ED2B68E1F954E152863430E3179FA812937B8B0Mobile Security
objectAppSizestring-The app size (in bytes)16906043Mobile Security
objectAppVerCodestring-The app version code0Mobile Security
objectAppVerNamestring-The app version1.0Mobile Security
objectCertAttrstring-The SHA-1 hash of the certificate public key05FC638156219800DADAC48D8E621E0BCBD3C321Mobile Security
objectFileCreationstring-The time the target file was created (in milliseconds) +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1648279273000
  • +
+
Mobile Security
objectFileHashSha256stringFileSHA2The SHA256 hash of target process image or target file +
    +
  • 39109eef00821658893b45634fe2f4664f880da9242712df907f1327d4ceefb8
  • +
  • 49fa3e206abf6a1f4546417dbe09f3f06b38847866a4a66de75bd90f39cb6c1c
  • +
  • 0969321ad5a0923f0f03896ad2c10e49290515c44b721d773942a37f62a24893
  • +
+
Mobile Security
objectFileModifiedTimestring-The modification time of the target file (in milliseconds) +
    +
  • 1652131848000
  • +
  • 1577865600000
  • +
  • 1648279273000
  • +
+
Mobile Security
objectFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The file path of the target process image or target file +
    +
  • /usr/bin/bash
  • +
  • /bin/bash
  • +
  • /opt/folder1/probes/system/processes/processes
  • +
+
Mobile Security
objectFileSizestring-The target file size +
    +
  • 0
  • +
  • 59456
  • +
  • 60
  • +
+
Mobile Security
objectFirstSeenstring-The time when the object first appeared (in milliseconds) +
    +
  • 1656458063638
  • +
  • 1656260547165
  • +
  • 0
  • +
+
Mobile Security
objectHashIdstring-The event object hash ID +
    +
  • 8576474808125313522
  • +
  • -599270888483415002
  • +
  • 2177864258235728980
  • +
  • 2432229257
  • +
+
Mobile Security
objectLastSeenstring-The time when the object was last seen (in milliseconds) +
    +
  • 1656458354730
  • +
  • 1656260580722
  • +
  • 0
  • +
+
Mobile Security
objectSystemEventAttrstring-The system event attributesLOCK_SCREENMobile Security
osNamestring-The host OS name +
    +
  • Linux
  • +
  • windows 10.0.22000
  • +
  • windows 10.0.19044
  • +
  • windows 10.0.19043
  • +
+
+
    +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Data Detection and Response
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
osNamestring-The host operating system name +
    +
  • Windows
  • +
  • Linux
  • +
  • macOS
  • +
+
Mobile Security
osVerstring-The OS version11 +
    +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Data Detection and Response
  • +
+
osVerstring-The OS version +
    +
  • Amazon Linux 2
  • +
  • 10.0.19044
  • +
  • 10.0.19042
  • +
+
Mobile Security
pnamestring-The internal product ID +
    +
  • Trend Micro Deep Security
  • +
  • Deep Discovery Inspector
  • +
  • Apex One
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
+
pnamestring-Internal product ID (Deprecated, use productCode) +
    +
  • 2200
  • +
  • 751
  • +
  • 533
  • +
+
Mobile Security
pverstring-The product version +
    +
  • 20.0.0.4726
  • +
  • 20.0.0.4416
  • +
  • 6.2.1125
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Trend Vision One Container Security
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
pverstring-The product version +
    +
  • 1.2.0.2752
  • +
  • 1.0.345
  • +
  • 1.2.0.2657
  • +
+
Mobile Security
requeststringURLThe notable URLs +
    +
  • http://example.page.com/canonical.html
  • +
  • http://10.10.10.10
  • +
  • https://drive.google.com/
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
+
requeststringURLRequest URL +
    +
  • http://10.10.10.10/fake/site
  • +
  • http:///fake/param.cgi?action=list&group=Alarm.Status
  • +
  • http://fake.com/
  • +
+
Mobile Security
scoreint-The Web Reputation Services URL rating +
    +
  • 71
  • +
  • 81
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
srcFileCreationstring-The time when the source file was created (in milliseconds) +
    +
  • 1577865600000
  • +
  • 1626201752000
  • +
  • 1626201750000
  • +
+
Mobile Security
srcFileHashIdstring-The source file hash ID +
    +
  • 1102079405020678318
  • +
  • -6926286289273504319
  • +
  • 8528955148329941480
  • +
+
Mobile Security
srcFileHashSha256stringFileSHA2The SHA256 hash of source file +
    +
  • 4eaa002225f4ea2dedcd19b7f1337d7c58ea7dd6d4571c12468dde95e6bcfdaf
  • +
  • e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80
  • +
  • 16b20a3ad485b4fbbe3028c7e743b226db21ea93cacc8b3d7d7d4a731bf02333
  • +
+
Mobile Security
srcFileModifiedTimestring-The time when the source file was modified (in milliseconds) +
    +
  • 1626201752000
  • +
  • 1626201750000
  • +
  • 1577865600000
  • +
+
Mobile Security
srcFilePathstring +
    +
  • FileFullPath
  • +
  • FileName
  • +
+
The source file path +
    +
  • \\cnva-apps\megaclockprod\traveler\travelerprint.accdb
  • +
  • c:\program files\common files\microsoft shared\clicktorun\officesvcmgrschedule.xml
  • +
  • q:\a7_dbs\a4_pkg\a4_packaging.accde
  • +
+
Mobile Security
srcFileSizestring-The source file size +
    +
  • 0
  • +
  • 131072
  • +
  • 196608
  • +
+
Mobile Security
srcFirstSeenstring-The time when the source file first appeared (in milliseconds) +
    +
  • 0
  • +
  • 1656355418449
  • +
  • 1656714760440
  • +
+
Mobile Security
srcLastSeenstring-The time when the source file was last seen (in milliseconds) +
    +
  • 0
  • +
  • 1656355418449
  • +
  • 1656715147313
  • +
+
Mobile Security
systemEventAttrstring-The attributes of the system event (if the subject is a system event)usbdebuggingMobile Security
urlCatdynamic-The requested URL category +
    +
  • Untested
  • +
  • 158
  • +
  • Web Advertisement
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Trend Micro Cloud App Security
  • +
  • Mobile Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
userTypestring-The user type +
    +
  • Microsoft Endpoint Manager
  • +
  • Azure Active Directory
  • +
  • VMware Workspace ONE UEM
  • +
+
Mobile Security
+
+ +## Field Statistics +- **Total Fields:** 83 +- **Layer:** Others +- **Product:** Mobile Security + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Others/TXOne EdgeOne.md b/pages/Others/TXOne EdgeOne.md new file mode 100644 index 0000000..39f5104 --- /dev/null +++ b/pages/Others/TXOne EdgeOne.md @@ -0,0 +1,781 @@ +--- +layout: default +title: TXOne EdgeOne - Others +--- + +# TXOne EdgeOne +**Layer:** Others + +This documentation provides detailed information about all fields available for TXOne EdgeOne. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actdynamic-The actions taken to mitigate the event +
    +
  • log
  • +
  • isolate
  • +
  • terminate
  • +
  • not blocked
  • +
  • Block
  • +
  • No action
  • +
  • Reset
  • +
  • Pass
  • +
  • User Decision
  • +
+
+
    +
  • Trend Vision One Container Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Cloud App Security
  • +
  • TippingPoint Security Management System
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Email Sensor
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
cntstring-The total number of logs +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
directionstring-The direction +
    +
  • Incoming
  • +
  • Outgoing
  • +
  • Unknown
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
+
dmacstring-The MAC address of the destination IP (dest_ip) +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
dptintPortThe destination port +
    +
  • 445
  • +
  • 80
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
dstdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The destination IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
endpointIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP address of the endpoint on which the event was detected10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointMacAddressstring-The MAC address of endpoint +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
filterNamestring-The filter name +
    +
  • ConnectionFilter
  • +
  • Virtual Analyzer
  • +
  • Data Loss Prevention
  • +
+
+
    +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
+
filterTypestring-The filter type +
    +
  • Spam filter
  • +
  • Size filter
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
+
hostNamestring +
    +
  • DomainName
  • +
  • HostDomain
  • +
+
The computer name of the client host (The hostname from the suspicious URL detected by Deep Discovery Inspector) +
    +
  • Let's Encrypt
  • +
  • 10.10.10.10
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
interestedIpdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The IP of the interestedHost10.10.10.10 +
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
+
interestedMacAddressstring-The MAC address identified as the log owner's +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
+
majorVirusTypestring-The virus type +
    +
  • Virus
  • +
  • Suspicious Activity
  • +
  • Trojan
  • +
  • TROJ
  • +
+
+
    +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Mobile Security
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
  • File Security Storage
  • +
+
policyNamestring-The name of the triggered policy +
    +
  • Steelcase
  • +
  • Cabot
  • +
  • Tigre - Medium Policy
  • +
  • apiPostedPolicy
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Web Security
  • +
  • Trend Micro Email Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
protostring-The exploited layer network protocol +
    +
  • 6
  • +
  • TCP
  • +
  • 17
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
remarksstring-The additional information +
    +
  • warning: fork: Resource temporarily unavailable
  • +
  • pam_unix(cron:session): session opened for user root by (uid=0)
  • +
  • WinEvtLog: Application: AUDIT_FAILURE(18470): MSSQL$SA: (no user): no domain: EXAMPLE.com: Login failed for user 'example_user'. Reason: The account is disabled. [CLIENT: 10.10.10.10]
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Email Security
  • +
  • Trend Cloud One - Network Security
  • +
  • TXOne EdgeOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
ruleId64long-The IPS rule ID +
    +
  • 1134268
  • +
  • 4026531849
  • +
  • 4026531852
  • +
+
+
    +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
smacstring-The source MAC address +
    +
  • 00:11:22:33:44:55
  • +
  • 66:77:88:99:AA:BB
  • +
  • CC:DD:EE:FF:00:11
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne EdgeOne
  • +
+
sptintPortThe source port +
    +
  • 53
  • +
  • 7680
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
srcdynamic +
    +
  • IPv4
  • +
  • IPv6
  • +
+
The source IP10.10.10.10 +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • Trend Vision One Container Security
  • +
  • Mobile Network Security
  • +
+
vLANIdint-The virtual LAN ID- +
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne EdgeOne
  • +
  • Mobile Network Security
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 23 +- **Layer:** Others +- **Product:** TXOne EdgeOne + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Others/TXOne StellarOne.md b/pages/Others/TXOne StellarOne.md new file mode 100644 index 0000000..9182bb4 --- /dev/null +++ b/pages/Others/TXOne StellarOne.md @@ -0,0 +1,654 @@ +--- +layout: default +title: TXOne StellarOne - Others +--- + +# TXOne StellarOne +**Layer:** Others + +This documentation provides detailed information about all fields available for TXOne StellarOne. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
actResultdynamic-The result of an action +
    +
  • Dropped
  • +
  • Successful
  • +
  • Accepted
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • Mobile Security
  • +
+
aggregatedCountstring-The number of aggregated events +
    +
  • 1
  • +
  • 2
  • +
  • 3
  • +
+
+
    +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Web Security
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
+
endpointGUIDstringEndpointIDThe GUID of the agent which reported the detection +
    +
  • ae4d64aa-f8b8-bb36-b265-f59272ed342f
  • +
  • 8fb979f6-1376-bed3-227f-f2886e66194e
  • +
  • ca2b3a7e-8415-c571-cc19-e45f69470026
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Data Detection and Response
  • +
+
endpointHostNamestringEndpointNameThe endpoint hostname or node where the event was detected +
    +
  • 10.10.10.10 (swpos-aws-aza02) [i-0f0f0f0f0f0f0f0f0]
  • +
  • ip-10-10-10-10.us-west-1.compute.internal
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Endpoint Sensor
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • Mobile Security
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Data Detection and Response
  • +
+
endpointMacAddressstring-The MAC address of endpoint +
    +
  • 00:00:00:00:00:00
  • +
  • ff:ff:ff:ff:ff:ff
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
+
eventIdstring-The event ID from the logs of each product +
    +
  • 100100
  • +
  • 100101
  • +
  • 100116
  • +
  • 100117
  • +
  • 100119
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Cloud App Security
  • +
  • Endpoint Sensor
  • +
  • Trend Micro Email Security
  • +
  • TXOne StellarOne
  • +
  • Trend Vision One Container Security
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventNamestring-The event type +
    +
  • LOG_INSPECTION_EVENT
  • +
  • SECURITY_RISK_DETECTION
  • +
  • WEB_THREAT_DETECTION
  • +
  • LOG_INSPECTION_EVENT
  • +
  • MALWARE_DETECTION
  • +
  • PROCESS_ACTIVITY
  • +
  • WEB_POLICY_VIOLATION
  • +
  • DEEP_PACKET_INSPECTION_EVENT
  • +
  • INTEGRITY_MONITORING_EVENT
  • +
  • DISRUPTIVE_APPLICATION_DETECTION
  • +
  • PRODUCT_SUMMARY
  • +
  • PRODUCT_UPDATE
  • +
  • BEHAVIORAL_VIOLATION
  • +
  • FIREWALL_POLICY_VIOLATION
  • +
  • SUSPICIOUS_BEHAVIOUR_DETECTION
  • +
  • DENYLIST_CHANGE
  • +
  • MACHINE_LEARNING_DETECTION
  • +
  • DLP_VIOLATION
  • +
  • MALWARE_OUTBREAK_DETECTION
  • +
  • SENSITIVE_DATA_DETECTION
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • TippingPoint Security Management System
  • +
  • Trend Micro Cloud App Security
  • +
  • Trend Micro Email Security
  • +
  • Endpoint Sensor
  • +
  • Trend Cloud One - Network Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne EdgeOne
  • +
  • Zero Trust Secure Access - Private Access
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Mobile Security
  • +
  • Mobile Network Security
  • +
  • Data Detection and Response
  • +
+
eventSubIdint-The access type +
    +
  • 4
  • +
  • 101
  • +
  • 102
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • TXOne StellarOne
  • +
+
fileNamedynamicFileNameThe file name +
    +
  • spoolss
  • +
  • hosts
  • +
  • svcrestarttask
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Security
  • +
  • Zero Trust Secure Access - Internet Access
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
+
filePathstringFileFullPathThe file path without the file name +
    +
  • security
  • +
  • /var/log/audit/audit.log
  • +
  • application
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
+
filePathNamestringFileFullPathThe file path with the file name +
    +
  • vss
  • +
  • spoolss
  • +
  • /etc/hosts
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
+
firstSeenstring-The first time the XDR log appeared1657195233000 +
    +
  • Trend Micro Cloud App Security
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
+
fullPathstringFileFullPathThe combination of the file path and the file name +
    +
  • \etc\hosts
  • +
  • c:\windows\system32\tasks\microsoft\windows\softwareprotectionplatform\svcrestarttask
  • +
  • \var\log\auth.log
  • +
+
+
    +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Apex One as a Service
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • TXOne StellarOne
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
lastSeenstring-The last time the XDR log appeared1657195233000 +
    +
  • Trend Micro Cloud App Security
  • +
  • TXOne StellarOne
  • +
  • Data Detection and Response
  • +
+
majorVirusTypestring-The virus type +
    +
  • Virus
  • +
  • Suspicious Activity
  • +
  • Trojan
  • +
  • TROJ
  • +
+
+
    +
  • Trend Micro Deep Security
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Mobile Security
  • +
  • TXOne EdgeOne
  • +
  • TXOne StellarOne
  • +
  • File Security Storage
  • +
+
malNamestring-The name of the detected malware +
    +
  • SecurityLevelDrop
  • +
  • Regla Logs All
  • +
  • USR_SUSPICIOUS_DOMAIN.UMXX
  • +
+
+
    +
  • Trend Micro Apex One as a Service
  • +
  • Trend Cloud One - Endpoint & Workload Security
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
  • Trend Micro Deep Security
  • +
  • Trend Micro Web Security
  • +
  • TXOne StellarOne
  • +
  • Email Sensor
  • +
  • File Security
  • +
  • File Security Storage
  • +
  • Agentless Vulnerability & Threat Detection
  • +
  • Trend Vision One Container Security
  • +
+
parentFileHashSha256stringFileSHA2The SHA-256 of the subject parent process +
    +
  • 14A1223722D486ABBC88682AB49AF8E56DC65AC4E153027985BFFFF7C815C0EC
  • +
  • 2EF51284CA9211ADEC3E8E095F386FEC742E0532075894AE99024C65949F935E
  • +
  • F3FEB95E7BCFB0766A694D93FCA29EDA7E2CA977C2395B4BE75242814EB6D881
  • +
+
+
    +
  • Endpoint Sensor
  • +
  • TXOne StellarOne
  • +
+
quarantineFileNamestring-The file path of the quarantined objectC:\Program Files\TXOne\StellarProtect\private\quarantine\00000000-0000-0000-0000-000000000000TXOne StellarOne
techniqueIddynamicTechniqueTechnique ID detected by the product agent base on a detection rule- +
    +
  • TXOne StellarOne
  • +
  • Trend Micro Deep Discovery Inspector
  • +
  • Network Sensor
  • +
+
+
+ +## Field Statistics +- **Total Fields:** 19 +- **Layer:** Others +- **Product:** TXOne StellarOne + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Others/Trend Cloud One - AWS CloudTrail Integration.md b/pages/Others/Trend Cloud One - AWS CloudTrail Integration.md new file mode 100644 index 0000000..98900ac --- /dev/null +++ b/pages/Others/Trend Cloud One - AWS CloudTrail Integration.md @@ -0,0 +1,458 @@ +--- +layout: default +title: Trend Cloud One - AWS CloudTrail Integration - Others +--- + +# Trend Cloud One - AWS CloudTrail Integration +**Layer:** Others + +This documentation provides detailed information about all fields available for Trend Cloud One - AWS CloudTrail Integration. + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
additionalEventDatadynamic-The additional data about the event that was not part of the request{"SignatureVersion":"SigV4","CipherSuite":"ECDHE-RSA-AES128-GCM-SHA256"}Trend Cloud One - AWS CloudTrail Integration
apiVersionstring-API version associated with the AwsApiCall eventType value2012-08-10Trend Cloud One - AWS CloudTrail Integration
awsRegionstring-AWS region that the request was made to +
    +
  • us-east-1
  • +
  • us-east-2
  • +
  • us-west-1
  • +
+
Trend Cloud One - AWS CloudTrail Integration
errorCodestring-AWS service error code +
    +
  • ThrottlingException
  • +
  • InvalidParameterValueException
  • +
  • NoSuchLifecycleConfiguration
  • +
+
Trend Cloud One - AWS CloudTrail Integration
errorMessagestring-Description of the error +
    +
  • The specified bucket does not have a website configuration
  • +
  • An unknown error occurred
  • +
  • The lifecycle configuration does not exist
  • +
+
Trend Cloud One - AWS CloudTrail Integration
eventCategorystring-Event category used in LookupEvents calls +
    +
  • Management
  • +
  • Data
  • +
  • Insight
  • +
+
Trend Cloud One - AWS CloudTrail Integration
eventIDstring-GUID generated by AWS CloudTrail to identify events11111111-1111-1111-1111-111111111111Trend Cloud One - AWS CloudTrail Integration
eventNamestring-The name of the log event +
    +
  • PutObject
  • +
  • GetObject
  • +
  • DescribeTable
  • +
+
Trend Cloud One - AWS CloudTrail Integration
eventSourcestring-The AWS service the request was made to +
    +
  • s3.amazonaws.com
  • +
  • dynamodb.amazonaws.com
  • +
  • xray.amazonaws.com
  • +
+
Trend Cloud One - AWS CloudTrail Integration
eventTimestring-The time the agent or product detected the event2022-07-06T22:28:06+00:00Trend Cloud One - AWS CloudTrail Integration
eventTypestring-Type of event that generated the event record +
    +
  • AwsApiCall
  • +
  • AwsServiceEvent
  • +
  • AwsConsoleAction
  • +
+
Trend Cloud One - AWS CloudTrail Integration
eventVersionstring-Version of the log event format1.08Trend Cloud One - AWS CloudTrail Integration
readOnlybool-Whether the operation is read-only +
    +
  • True
  • +
+
Trend Cloud One - AWS CloudTrail Integration
recipientAccountIdstring-Account ID that received the event123456789012Trend Cloud One - AWS CloudTrail Integration
requestIDstring-Value that identifies the request (The service being called generates this value)11111111-1111-1111-1111-111111111111Trend Cloud One - AWS CloudTrail Integration
requestParametersdynamic-The parameters, if any, that were sent with the request (Parameters are documented in the API reference docs for the appropriate AWS service){"durationSeconds": 3600, "roleSessionName":"BackplaneAssumeRoleSession"}Trend Cloud One - AWS CloudTrail Integration
resourcesdynamic-List of resources accessed in the event[{"type":"AWS::S3::Object","ARN":"arn:aws:s3:::your-bucket/file.txt"}]Trend Cloud One - AWS CloudTrail Integration
responseElementsdynamic-Response elements for actions that made changes (create, update, or delete actions){"user":{"createDate":"Mar 24, 2014 9:11:59 PM","userName":"Bob","arn":"arn:aws:iam::123456789012:user/Bob","path":"/","userId":"EXAMPLEUSERID"}}Trend Cloud One - AWS CloudTrail Integration
serviceEventDetailsdynamic-The service event (including what triggered the event and the result){"lifecycleEventPolicy":{"policyVersion":1,"policyId":"11111111-1111-1111-1111-111111111111"}}Trend Cloud One - AWS CloudTrail Integration
sharedEventIDstring-GUID generated by AWS CloudTrail to uniquely identify CloudTrail events (From the same AWS action that is sent to different AWS accounts)11111111-1111-1111-1111-111111111111Trend Cloud One - AWS CloudTrail Integration
sourceIPAddressstring +
    +
  • IPv4
  • +
  • IPv6
  • +
+
IP address the request was made from (For actions that originate from the service console, the address reported is for the underlying customer resource, not the console web server. For services in AWS, only the DNS name is displayed.) +
    +
  • 10.10.10.10
  • +
  • apigateway.amazonaws.com
  • +
  • config.amazonaws.com
  • +
+
Trend Cloud One - AWS CloudTrail Integration
userAgentstringCLICommandThe user agent or the agent through which the request was made +
    +
  • signin.amazonaws.com
  • +
  • console.amazonaws.com
  • +
  • aws-cli/1.3.23 Python/2.7.6 Linux/2.6.18-164.el5
  • +
+
Trend Cloud One - AWS CloudTrail Integration
userIdentitydynamic-Information about the user that made a request +
    +
  • {"type":"AWSService","invokedBy":"apigateway.amazonaws.com"}
  • +
  • {"type":"AWSService","invokedBy":"lambda.amazonaws.com"}
  • +
+
Trend Cloud One - AWS CloudTrail Integration
vpcEndpointIdstring-VPC endpoint in which requests were made from a VPC to another AWS service (Such as Amazon S3)vpce-00000000000000000Trend Cloud One - AWS CloudTrail Integration
+
+ +## Field Statistics +- **Total Fields:** 24 +- **Layer:** Others +- **Product:** Trend Cloud One - AWS CloudTrail Integration + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/Others/Trend Micro Deep Discovery Director Network Analytic SaaS.md b/pages/Others/Trend Micro Deep Discovery Director Network Analytic SaaS.md new file mode 100644 index 0000000..c01c2f0 --- /dev/null +++ b/pages/Others/Trend Micro Deep Discovery Director Network Analytic SaaS.md @@ -0,0 +1,212 @@ +--- +layout: default +title: Trend Micro Deep Discovery Director Network Analytic SaaS - Others +--- + +# Trend Micro Deep Discovery Director Network Analytic SaaS +**Layer:** Others + +This documentation provides detailed information about all fields available for Trend Micro Deep Discovery Director Network Analytic SaaS. + + + +
+ + + + + + + + + + + + + + + + + + + + + + +
Field NameTypeGeneral FieldDescriptionExampleProducts
flowIdstring-The connection ID +
    +
  • 6717474604962545666
  • +
  • 6915244861077872618
  • +
  • 6915244908215815814
  • +
+
Trend Micro Deep Discovery Director Network Analytic SaaS
+
+ +## Field Statistics +- **Total Fields:** 1 +- **Layer:** Others +- **Product:** Trend Micro Deep Discovery Director Network Analytic SaaS + +--- +*Generated by XDR Common Schema Public Doc Generator V2* diff --git a/pages/index.md b/pages/index.md new file mode 100644 index 0000000..eee7199 --- /dev/null +++ b/pages/index.md @@ -0,0 +1,432 @@ +--- +layout: default +title: TM V1 Schema (Commercial) - Field Documentation Index +--- + +# TM V1 Schema (Commercial) +## Field Documentation Index + +This page provides links to detailed field documentation for all products organized by layer. + + + + +
+

📊 Documentation Summary

+
+
+ 6 +
Layers
+
+
+ 31 +
Products
+
+
+ 2754 +
Total Fields
+
+
+
+ +## 📋 Products by Layer + + + + + + + + + + + + + + +--- + +## 🔗 Quick Navigation + +- **Browse by Layer**: Use the sections above to find products within specific layers +- **Field Count**: Each product shows the number of documented fields +- **Direct Links**: Click on any product name to view its detailed field documentation + +**Last Updated**: TM V1 Schema (Commercial) documentation +**Generated**: By XDR Common Schema Public Doc Generator V2 + +--- +*This index was automatically generated from the XDR Common Schema documentation.*