Deep Discovery Inspector: Trend Micro
Deep Discovery Inspector: Trend Micro
es ns pc
Endpoint Security Network Security Protected Cloud
Trend Micro Incorporated reserves the right to make changes to this
document and to the product described herein without notice. Before
installing and using the product, review the readme files, release notes,
and/or the latest version of the applicable documentation, which are
available from the Trend Micro website at:
http://docs.trendmicro.com
Trend Micro, the Trend Micro t-ball logo, Deep Discovery Advisor, Deep
Discovery Analyzer, Deep Discovery Inspector, and Control Manager are
trademarks or registered trademarks of Trend Micro Incorporated. All other
product or company names may be trademarks or registered trademarks of
their owners.
Copyright © 2020. Trend Micro Incorporated. All rights reserved.
Document Part No.: APEM59039/200721
Release Date: August 2020
Protected by U.S. Patent No.: 8595840; 8925074; 7707635; 8505094
This documentation introduces the main features of the product and/or
provides installation instructions for a production environment. Read
through the documentation before installing or using the product.
Detailed information about how to use specific features within the product
may be available at the Trend Micro Online Help Center and/or the Trend
Micro Knowledge Base.
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please contact us at docs@trendmicro.com.
Evaluate this documentation on the following site:
https://www.trendmicro.com/download/documentation/rating.asp
Privacy and Personal Data Collection Disclosure
Certain features available in Trend Micro products collect and send feedback
regarding product usage and detection information to Trend Micro. Some of
this data is considered personal in certain jurisdictions and under certain
regulations. If you do not want Trend Micro to collect personal data, you
must ensure that you disable the related features.
The following link outlines the types of data that Deep Discovery Inspector
collects and provides detailed instructions on how to disable the specific
features that feedback the information.
https://success.trendmicro.com/data-collection-disclosure
Data collected by Trend Micro is subject to the conditions stated in the Trend
Micro Privacy Notice:
https://www.trendmicro.com/privacy
Table of Contents
Chapter 1: Introduction
Terminology ....................................................................... 1-2
Chapter 2: Revisions
i
Trend Micro Deep Discovery Inspector Syslog Guide
ii
Preface
Preface
Learn more about the following topics:
• Documentation on page iv
• Audience on page v
• Document Conventions on page v
• About Trend Micro on page vi
iii
Trend Micro Deep Discovery Inspector Syslog Guide
Documentation
The documentation set for Deep Discovery Inspector includes the following:
Table 1. Product Documentation
Document Description
AWS Deployment Guide The AWS Deployment Guide contains information about
requirements and procedures for planning deployment,
deploying, and troubleshooting Deep Discovery Inspector
deployment on AWS.
Installation and Deployment The Installation and Deployment Guide contains information
Guide about requirements and procedures for planning deployment,
installing Deep Discovery Inspector, and using the
Preconfiguration Console to set initial configurations and
perform system tasks.
Syslog Content Mapping The Syslog Content Mapping Guide provides information about
Guide log management standards and syntaxes for implementing
syslog events in Deep Discovery Inspector.
Quick Start Card The Quick Start Card provides user-friendly instructions on
connecting Deep Discovery Inspector to your network and on
performing the initial configuration.
iv
Preface
Document Description
View and download product documentation from the Trend Micro Online
Help Center:
https://docs.trendmicro.com/en-us/home.aspx
Audience
The Deep Discovery Inspector documentation is written for IT
administrators and security analysts. The documentation assumes that the
reader has an in-depth knowledge of networking and information security,
including the following topics:
• Network topologies
• Database management
• Antivirus and content security protection
The documentation does not assume the reader has any knowledge of
sandbox environments or threat event correlation.
Document Conventions
The documentation uses the following conventions:
v
Trend Micro Deep Discovery Inspector Syslog Guide
Convention Description
Monospace Sample command lines, program code, web URLs, file names,
and program output
Configuration notes
Note
Recommendations or suggestions
Tip
vi
Preface
vii
Chapter 1
Introduction
The Trend Micro™ Syslog Content Mapping Guide provides information
about log management standards and syntaxes for implementing syslog
events in Trend Micro Deep Discovery Inspector.
To enable flexible integration with third-party log management systems,
Deep Discovery Inspector supports the following syslog formats:
Log Event Extended Format (LEEF) LEEF is an event format developed for IBM
Security QRadar.
For details, see Syslog Content Mapping - LEEF
on page 4-1 Deep Discovery Inspector uses a subset of the
LEEF dictionary.
Trend Micro Event Format (TMEF) TMEF is a superset of log fields that allow a
third-party syslog collector to better control
For details, see Syslog Content Mapping - TMEF and mitigate detection events provided by
on page 5-1 Deep Discovery Inspector.
1-1
Trend Micro Deep Discovery Inspector Syslog Guide
Terminology
Term Description
1-2
Chapter 2
Revisions
There were no revisions for version 5.7.
2-1
Chapter 3
3-1
Trend Micro Deep Discovery Inspector Syslog Guide
3-2
Syslog Content Mapping - CEF
3-3
Trend Micro Deep Discovery Inspector Syslog Guide
3-4
Syslog Content Mapping - CEF
3-5
Trend Micro Deep Discovery Inspector Syslog Guide
Log sample:
3-6
Syslog Content Mapping - CEF
3-7
Trend Micro Deep Discovery Inspector Syslog Guide
3-8
Syslog Content Mapping - CEF
Log Sample:
3-9
Trend Micro Deep Discovery Inspector Syslog Guide
3-10
Syslog Content Mapping - CEF
3-11
Trend Micro Deep Discovery Inspector Syslog Guide
3-12
Syslog Content Mapping - CEF
Log sample:
3-13
Trend Micro Deep Discovery Inspector Syslog Guide
3-14
Syslog Content Mapping - CEF
Log sample:
3-15
Trend Micro Deep Discovery Inspector Syslog Guide
Log sample:
3-16
Syslog Content Mapping - CEF
3-17
Trend Micro Deep Discovery Inspector Syslog Guide
Log sample:
3-18
Syslog Content Mapping - CEF
3-19
Trend Micro Deep Discovery Inspector Syslog Guide
Log sample:
3-20
Chapter 4
Note
In LEEF log syntax, separate event attributes with a tab delimiter, <009>.
4-1
Trend Micro Deep Discovery Inspector Syslog Guide
4-2
Syslog Content Mapping - LEEF
4-3
Trend Micro Deep Discovery Inspector Syslog Guide
4-4
Syslog Content Mapping - LEEF
4-5
Trend Micro Deep Discovery Inspector Syslog Guide
4-6
Syslog Content Mapping - LEEF
sUser1LoginTime Source user log on time 1 Example: Mar 09 2015 17:05:21 GMT
+08:00
sUser2LoginTime Source user log on time 2 Example: Mar 09 2015 17:05:21 GMT
+08:00
4-7
Trend Micro Deep Discovery Inspector Syslog Guide
sUser3LoginTime Source user log on time 3 Example: Mar 09 2015 17:05:21 GMT
+08:00
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-8
Syslog Content Mapping - LEEF
tedIp=172.16.1.197<009>peerIp=216.52.115.2<009>hostName=www.
freewebs.com<009>cnt=1<009>aggregatedCnt=1<009>cccaDestinati
onFormat=URL<009>cccaDetectionSource=GLOBAL_INTELLIGENCE<009
>cccaRiskLevel=2<009>cccaDestination=http://www.freewebs.com
/setting3/setting.doc<009>cccaDetection=1<009>evtCat=Callbac
k evtSubCat=Bot<009>pAttackPhase=Command and Control Communi
cation
4-9
Trend Micro Deep Discovery Inspector Syslog Guide
4-10
Syslog Content Mapping - LEEF
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-11
Trend Micro Deep Discovery Inspector Syslog Guide
BBB28-A4CE-0462-A536<009>ptype=IDS<009>devTime=Mar 09 2015 1
4:20:38 GMT+08:00<009>sev=2<009>protoGroup=STREAMING<009>pro
to=WMSP<009>vLANId=4095<009>deviceDirection=1<009>dhost=12.1
90.48.13<009>dst=12.190.48.13<009>dstPort=80<009>dstMAC=00:1
7:9a:65:f3:05<009>shost=192.168.33.2<009>src=192.168.33.2<00
9>srcPort=35125<009>srcMAC=00:16:6f:a1:3d:7a<009>msg=Deep Di
scovery Inspector detected the protocol in your monitored ne
twork.<009>pComp=CAV<009>threatType=6<009>srcGroup=Default<0
09>srcZone=1<009>dstZone=0<009>interestedIp=192.168.33.2<009
>peerIp=12.190.48.13<009>cnt=1<009>aggregatedCnt=1
4-12
Syslog Content Mapping - LEEF
4-13
Trend Micro Deep Discovery Inspector Syslog Guide
4-14
Syslog Content Mapping - LEEF
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-15
Trend Micro Deep Discovery Inspector Syslog Guide
Disease Vector<009>riskScore=49<009>threatTy
pe=5<009>interestedIp=172.16.1.197<009>
peerIp=216.52.115.2
4-16
Syslog Content Mapping - LEEF
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-17
Trend Micro Deep Discovery Inspector Syslog Guide
4-18
Syslog Content Mapping - LEEF
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-19
Trend Micro Deep Discovery Inspector Syslog Guide
DS<009>deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-AF0E<009>d
evTime=Mar 11 2015 22:05:50 GMT-04:00<009>sev=2<009>interest
edIp=172.16.0.100<009>interestedHost=172.16.0.100<009>intere
stedMacAddress=00:0c:29:70:45:...36<009>ruleId=47<009>ruleNa
me=This host has responded to DNS queries.<009>threatType=Un
registered Service<009>threatName=Unregistered DNS Server<00
9>proto=DNS Response<009>userGroup=Default<009>deviceDirecti
on=1
4-20
Syslog Content Mapping - LEEF
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-21
Trend Micro Deep Discovery Inspector Syslog Guide
4-22
Syslog Content Mapping - LEEF
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-23
Trend Micro Deep Discovery Inspector Syslog Guide
12webpages.com<009>deviceOSName=MAK_win7sp1en_offices_noab_T
L
4-24
Syslog Content Mapping - LEEF
Log sample:
Note
When using the LEEF log syntax, separate event attributes with <009> as a tab
delimiter.
4-25
Trend Micro Deep Discovery Inspector Syslog Guide
t=Add<009>dhost=ourdatatransfers.com<009>deviceExternalRiskT
ype=High<009>type=Deny List Domain
4-26
Chapter 5
5-1
Trend Micro Deep Discovery Inspector Syslog Guide
5-2
Syslog Content Mapping - TMEF
5-3
Trend Micro Deep Discovery Inspector Syslog Guide
5-4
Syslog Content Mapping - TMEF
5-5
Trend Micro Deep Discovery Inspector Syslog Guide
5-6
Syslog Content Mapping - TMEF
5-7
Trend Micro Deep Discovery Inspector Syslog Guide
5-8
Syslog Content Mapping - TMEF
sUser1LoginTime Source user log on time1 Example: Mar 09 2015 17:05:21 GMT
+08:00
5-9
Trend Micro Deep Discovery Inspector Syslog Guide
sUser2LoginTime Source user log on time 2 Example: Mar 09 2015 17:05:21 GMT
+08:00
sUser3LoginTime Source user log on time 3 Example: Mar 09 2015 17:05:21 GMT
+08:00
Log sample:
5-10
Syslog Content Mapping - TMEF
compressedFileName=eicar.com interestedIp=172.22.9.54
cnt=1 dOSName=Linux cn5Label=AggregatedCount
cn5=1 evtCat=Malware evtSubCat=Trojan cn2Label=APT
Related cn2=0 pAttackPhase=Point of Entry externalId=143
cn7Label=HeurFlag cn7=0 compressedFileType=327680
compressedFileHash=3395856CE81F2B7382DEE72602F
798B642F14140 hostSeverity=8 reason=["Malware:
Eicar_test_file"] devicePayloadId=0:143:P
5-11
Trend Micro Deep Discovery Inspector Syslog Guide
5-12
Syslog Content Mapping - TMEF
5-13
Trend Micro Deep Discovery Inspector Syslog Guide
Log sample:
5-14
Syslog Content Mapping - TMEF
5-15
Trend Micro Deep Discovery Inspector Syslog Guide
5-16
Syslog Content Mapping - TMEF
5-17
Trend Micro Deep Discovery Inspector Syslog Guide
5-18
Syslog Content Mapping - TMEF
Log sample:
5-19
Trend Micro Deep Discovery Inspector Syslog Guide
5-20
Syslog Content Mapping - TMEF
Log sample:
5-21
Trend Micro Deep Discovery Inspector Syslog Guide
5-22
Syslog Content Mapping - TMEF
5-23
Trend Micro Deep Discovery Inspector Syslog Guide
Log sample:
5-24
Syslog Content Mapping - TMEF
5-25
Trend Micro Deep Discovery Inspector Syslog Guide
Log sample:
5-26
Syslog Content Mapping - TMEF
Log sample:
5-27
Trend Micro Deep Discovery Inspector Syslog Guide
5-28
Syslog Content Mapping - TMEF
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1181|200120|D
ENYLIST_CHANGE|3|rt=Mar 11 2015 07:15:45 GMT-04:00 pComp=San
dbox dvc=10.201.156.143 dvchost=ddi38-143 deviceMacAddress=0
0:0C:29:A6:53:0C deviceGUID=D2C1D6D20FF8-4FC98F92-25EB-D7DA-
AF0E cs1Label=type cs1=Deny List URL end=Apr 10 2015 07:15:3
5-29
Trend Micro Deep Discovery Inspector Syslog Guide
5-30
Syslog Content Mapping - TMEF
Log sample:
5-31
Trend Micro Deep Discovery Inspector Syslog Guide
Log sample:
CEF:0|Trend Micro|Deep Discovery Inspector|3.8.1200|100134|R
ETROSCAN_DETECTION|8|guid=906A61690458-4099A441-898C-BDD2-C7
C1 report_id=0938508b-ec47-47a1-80ea-cd8e3b747822 scan_ts=Ma
r 29 2015 03:14:31 GMT+02:00 callback_time=Mar 29 2015 03:04
:31 GMT+02:00 callback_address=http://app2.winsoft98.com/app
.asp?prj\=4&pid\=haha1&logdata\=MacTryCnt:0&code\=&ver\=1.0.
0.45&appcheck\=1 compromised_client=59.125.99.235 cnc_host=
5-32
Syslog Content Mapping - TMEF
5-33
TREND MICRO INCORPORATED
225 E. John Carpenter Freeway, Suite 1500
Irving, Texas 75062 U.S.A.
Phone: +1 (817) 569-8900, Toll-free: (888) 762-8736
Email: support@trendmicro.com
www.trendmicro.com
Item Code: APEM59039/200721