Layer: Endpoint
This documentation provides detailed information about all fields available for Apex One as a Service.
| Field Name | Type | Searchable | General Field | Description | Example | Products |
|---|---|---|---|---|---|---|
| accessPermission | string | true | - | The access permission type |
|
|
| act | dynamic | true | - | The actions taken to mitigate the event |
|
|
| actResult | dynamic | true | - | The result of an action |
|
|
| additionalInfo | string | true | - | The filter rule info | Default |
|
| aggregatedCount | string | true | - | The number of aggregated events |
|
|
| application | string | true | - | The name of the requested application |
|
|
| authId | string | true | - | The authorization ID |
|
|
| behaviorCat | string | true | - | The matched policy category |
|
|
| blocking | string | true | - | The blocking type |
|
Apex One as a Service |
| bmGroup | string | true | - | The one-to-many data structure | logGenLocalDatetime:2022-07-08T09:21:11+00:00, act:Assessment, behaviorType:Registry, riskConfidenceLevel:1, ruleId:7, ruleName:New Service, behaviorCategory:Policy Enforcement, processFilePath:C:\Windows\SysWOW64\srts\wmipr.exe, aegisOperation:Set Key, objectFilePath:HKLM\SYSTEM\CurrentControlSet\Services\DpsiBSvc\Start, policyId:007, objectFileHashSha1:null, objectCmd:null, processFileHashSha1:null, processCmd:null, objectRegistryData:null, objectRegistryKeyHandle:null, objectRegistryValue:null | Apex One as a Service |
| cat | int | false | - | The weighted priority of the incident |
|
|
| cccaDetection | string | true | - | Is this log identified as a C&C callback address detection | Yes |
|
| cccaDetectionSource | string | true | - | Which list defines this CCCA detection rule |
|
|
| cccaRiskLevel | int | true | - | The severity level of the threat actors associated with the C&C servers |
|
|
| censusMaturityValue | int | true | - | The CENSUS maturity value |
|
|
| censusPrevalenceValue | int | true | - | The CENSUS prevalence value |
|
|
| channel | string | true | - | The channel through which the demanded WinEvent is delivered |
|
Apex One as a Service |
| channel | string | true | - | The Windows event channel |
|
|
| clientStatus | string | true | - | The client status when the event occurred |
|
Apex One as a Service |
| compressedFileHash | string | true | FileSHA1 | The SHA-1 of the decompressed archive |
|
|
| compressedFileHashSha256 | string | true | FileSHA2 | The SHA-256 of the compressed suspicious file |
|
|
| compressedFileName | string | true | FileName | The file name of the compressed file |
|
|
| computerDomain | string | true | - | The computer domain |
|
Apex One as a Service |
| confidence | int | false | - | The confidence rating returned from TrendX Hybrid Model (predictive machine learning). Values from 1-99. | 94 |
|
| correlationData | dynamic | true | - | The data for correlation | - |
|
| customAssetTags | dynamic | true | - | The list of custom asset tags | {"os":["linux", "windows"], "org":["bu1"]} |
|
| customAssetTags | dynamic | true | - | The list of custom asset tags | {"os":["linux", "windows"], "org":["bu1"]} |
|
| dacDeviceType | string | true | - | The device type |
|
|
| dceArtifactActions | dynamic | true | - | The actions performed on Damage Cleanup Engine artifacts |
|
|
| destinationPath | string | true | - | The intended destination of the file containing the digital asset or channel |
|
Apex One as a Service |
| detailTrace | int | false | - | Whether the detection comes with a detailed trace footprint | - | Apex One as a Service |
| detectedActions | dynamic | true | - | The actions performed on detected artifacts |
|
|
| detectedBackupArtifacts | dynamic | true | - | The information about detected artifacts | {"objectArtifactId": "025d9f2a-ac9c-4cdf-b9e4-cf20c6e40281_0.dmp", "action": "object_process_dump", "status": 0, "processCreationTime": "1627574338077", "processImageFileName": "C:\Program Files\aaa\bbb\objprocess.exe"} |
|
| detectedBackupArtifactsStatus | dynamic | true | - | The backup status of detected artifacts | ['0', '-67'] |
|
| detectedBackupFolder | string | true | - | The folder path for detected backup folders | C:\\Program Files (x86)\\Trend Micro\\artifact\\DCE |
|
| detectedPattern | string | true | - | The detected pattern | dct.virus |
|
| detectionAggregationIds | dynamic | true | - | The list of detection aggregation IDs | ['11111111-1111-1111-1111-111111111111'] |
|
| detectionAggressivenessLevel | int | false | - | The detection aggressiveness level |
|
|
| detectionEngineVersion | string | true | - | The detection engine version | 7.6.0 |
|
| detectionMeta | dynamic | true | - | The descriptions of the detected techniques | ['T1204 some description about this technique', 'T1573.001_AES another description about this technique'] |
|
| detectionName | string | true | - | The general name for the detection |
|
|
| detectionNames | dynamic | true | - | The rules that triggered the event | ['HS_EMOTET.SMAA', 'HM_AVEDOWN.SMZTIG-A', 'HE_DOCQRPHISH.SM'] |
|
| detectionType | string | true | - | The detection type |
|
|
| deviceGUID | string | true | - | The GUID of the agent which reported the detection |
|
|
| deviceModel | string | true | - | The device model number | c96a |
|
| deviceSerial | string | true | - | The device serial ID | 000000063a2e8f |
|
| direction | string | true | - | The direction |
|
|
| dmac | string | true | - | The MAC address of the destination IP (dest_ip) |
|
|
| domainName | string | true | DomainName | The detected domain name |
|
|
| dpt | int | true | Port | The destination port |
|
|
| dpt | int | true | Port | The destination port number | - |
|
| dst | dynamic | true |
|
The destination IP | 10.10.10.10 |
|
| dst | string | true |
|
The destination IP address |
|
|
| duser | dynamic | true | EmailRecipient | The email recipient |
|
|
| dvchost | string | true | - | The computer which installed the Trend Micro product |
|
|
| endpointGUID | string | true | EndpointID | The GUID of the agent which reported the detection |
|
|
| endpointGuid | string | true | EndpointID | Host GUID of the endpoint on which the event was detected | 11111111-1111-1111-1111-111111111111 |
|
| endpointHostName | string | true | EndpointName | The endpoint hostname or node where the event was detected |
|
|
| endpointHostName | string | true | EndpointName | The host name of the endpoint on which the event was detected |
|
|
| endpointIp | dynamic | true |
|
The IP address of the endpoint on which the event was detected | 10.10.10.10 |
|
| endpointIp | dynamic | true |
|
IP address of the endpoint on which the event was detected |
|
|
| endpointMacAddress | string | true | - | The MAC address of endpoint |
|
|
| endpointMacAddress | dynamic | true | - | The host MAC address |
|
|
| engineOperation | string | true | - | The operation of the engine event |
|
|
| engType | string | true | - | The engine type |
|
|
| engVer | string | true | - | The engine version |
|
|
| eventDataAccessList | string | true | - | The list of requested access rights |
|
|
| eventDataAccessMask | string | true | - | The hexadecimal value of the requested or used permissions during an access attempt |
|
|
| eventDataActionName | string | true | - | The action performed |
|
|
| eventDataAuthenticationPackageName | string | true | - | The authentication package name of the Windows event data |
|
|
| eventDataElevatedToken | string | true | - | Whether the session is elevated and has administrator privileges |
|
|
| eventDataFullyQualifiedAssemblyName | string | true | - | The fully qualified .NET assembly name |
|
|
| eventDataImpersonationLevel | string | true | - | The sign-in session impersonation level |
|
|
| eventDataIpAddress | string | true | - | The IP address for Windows event 4624 which is "An account was successfully logged on" |
|
|
| eventDataJobOwner | string | true | - | The name of the account that initiated the event |
|
Apex One as a Service |
| eventDataLogonProcessName | string | true | - | The name of the Windows event sign in process name |
|
|
| eventDataLogonType | string | true | - | The logon type for Windows event 4624 which is "An account was successfully logged on" |
|
|
| eventDataModuleILPath | string | true | - | The CIL image path of the module or the dynamic module name |
|
|
| eventDataObjectName | string | true | - | The identifying information about the object for which access was requested |
|
|
| eventDataObjectType | string | true | - | The object type |
|
|
| eventDataOperation | string | true | - | Windows event 11 |
|
|
| eventDataPath | string | true | - | The path of the Windows event data |
|
|
| eventDataProcessPath | string | true | - | The process path that initiated the event |
|
Apex One as a Service |
| eventDataScriptBlockText | string | true | - | Windows event 4104, Creating Scriptblock text |
|
Apex One as a Service |
| eventDataStatus | string | true | - | The Windows event data status |
|
|
| eventDataSubjectUserName | string | true | - | The account name |
|
|
| eventDataSubStatus | string | true | - | The Windows event data sub status |
|
|
| eventDataTargetDomainName | string | true | - | The target sign-in account domain or computer name |
|
|
| eventDataTargetName | string | true | - | The service, application, or network resource name |
|
|
| eventDataTargetUserName | string | true | - | The user name of the Windows event data target |
|
Apex One as a Service |
| eventDataTaskName | string | true | - | The task name logged by the Windows event |
|
|
| eventDataTicketEncryptionType | string | true | - | The cryptographic suite used for the Kerberos TGS |
|
|
| eventDataTicketOptions | string | true | - | The authentication request Kerberos ticket behavior and permissions flags |
|
|
| eventDataUserContext | string | true | - | The user context of the Windows event data |
|
|
| eventDataWorkstationName | string | true | - | The name of the computer used in the sign-in attempt |
|
|
| eventHashId | string | true | - | The event hash ID |
|
|
| eventId | string | true | - | The event ID from the logs of each product |
|
|
| eventId | int | true | - | Event type | - |
|
| eventMessage | string | true | - | The event message | [0x13bb4e2a0] activating connection: mach=true listener=false peer=false name=com.apple.airportd |
|
| eventName | string | true | - | The event type |
|
|
| eventSubId | int | true | - | The access type |
|
|
| eventSubName | string | true | - | The event type sub-name |
|
|
| eventTime | real | true | - | The time the agent detected the event | 1657781088000 |
|
| extraInfo | dynamic | true | - | The network application name |
|
Apex One as a Service |
| fileCreation | string | true | - | The file creation date | 1595918517000 | Apex One as a Service |
| fileDesc | string | true | - | The file description |
|
|
| fileHash | string | true | FileSHA1 | The SHA-1 of the file that triggered the rule or policy |
|
|
| fileHashSha256 | string | true | FileSHA2 | The SHA-256 of the file (fileName) |
|
|
| fileName | dynamic | true | FileName | The file name |
|
|
| filePath | string | true | FileFullPath | The file path without the file name |
|
|
| fileSize | string | true | - | The file size of the suspicious file |
|
|
| fileVer | string | true | - | The file version |
|
Apex One as a Service |
| filterName | string | true | - | The filter name |
|
|
| filterType | string | true | - | The filter type |
|
|
| firstAct | string | true | - | The first scan action |
|
|
| firstActResult | string | true | - | The first scan action result |
|
|
| firstSeen | real | false | - | The first time the event was seen | 1656355418449 |
|
| forensicFileHash | string | true | - | The hash value of the forensic data file |
|
Apex One as a Service |
| forensicFilePath | string | true | - | The file path of the forensic file (When a Data Loss Prevention policy is triggered, the file is encrypted and copied to the OfficeScan server for post-mortem analysis) |
|
Apex One as a Service |
| ftpUser | string | true | - | The FTP login user name |
|
Apex One as a Service |
| fullPath | string | true | FileFullPath | The combination of the file path and the file name |
|
|
| hookId | string | true | - | The hook ID |
|
Apex One as a Service |
| hostName | string | true |
|
The domain name |
|
|
| httpReferer | string | true | URL | The HTTP referer |
|
|
| httpReferer | string | true | URL | The HTTP header referer |
|
|
| instanceId | string | true | - | The ID of the instance that indicates the meta-cloud or data center VM |
|
|
| integrityLevel | int | true | - | The integrity level of a process | - |
|
| interestedHost | string | true | DomainName | The endpoint hostname (For example, if an intranet host accesses a suspicious internet host, the intranet host is the "peerHost" and the internet host is the "interestedHost") |
|
|
| interestedIp | dynamic | true |
|
The IP of the interestedHost | 10.10.10.10 |
|
| interestedMacAddress | string | true | - | The MAC address identified as the log owner's |
|
|
| isHidden | string | true | - | Whether the detection log generated a grey rule match | Yes |
|
| isProxy | bool | true | - | Whether something is a proxy | False |
|
| lastSeen | real | false | - | The last time the event was seen | 1656355418449 |
|
| logKey | string | true | - | The unique key of the event |
|
|
| logonUser | dynamic | true | UserAccount | The logon user name |
|
|
| mailDeliveryTime | string | true | - | The mail delivery time | 1900-1-1 00:00:00 | Apex One as a Service |
| mailMsgSubject | string | true | EmailSubject | The email subject |
|
|
| malDst | string | true | - | The malware infection destination |
|
Apex One as a Service |
| malFamily | string | true | - | The threat family |
|
|
| malName | string | true | - | The name of the detected malware |
|
|
| malSrc | string | true | FileFullPath | The malware infection source |
|
|
| malSubType | string | true | - | The subsidiary virus type | Unknown |
|
| malType | string | true | - | The risk type for Network Content Correlation Engine rules |
|
|
| matchedContent | dynamic | true | - | The one-to-many data structure |
|
Apex One as a Service |
| mDevice | dynamic | true | - | IP of the source |
|
Apex One as a Service |
| mDeviceGUID | string | true | - | The GUID of the agent host |
|
|
| messageType | string | true | - | The message type | Default |
|
| moduleName | string | false | - | The module where a hook procedure was set up |
|
Apex One as a Service |
| moduleScanType | string | true | - | The module scan type | traditional |
|
| mpname | string | true | - | The management product name |
|
|
| mpver | string | true | - | The product version |
|
|
| msgAct | string | true | - | The message action |
|
Apex One as a Service |
| msgId | string | true | EmailMessageID | The internet message ID |
|
|
| objectAppName | string | true | - | Name of the app involved in the AMSI event |
|
|
| objectArtifactIds | dynamic | true | - | The artifact IDs generated by objectAction |
|
|
| objectAttributes | string | true | - | The object attributes | attribute |
|
| objectAuthId | string | true | - | The object authorization ID |
|
|
| objectCmd | dynamic | true | CLICommand | The object process command line |
|
|
| objectCmd | string | true | CLICommand | Command line entry of target process |
|
|
| objectContentName | string | true | - | The AMSI object content name |
|
|
| objectCurrentFileSize | long | true | - | Previous size of modified object file |
|
|
| objectEntityName | string | true | - | The object entity name |
|
Apex One as a Service |
| objectFileAccess | string | true | - | The object file access details | 1717658631000 |
|
| objectFileCreation | string | true | - | The UTC time that the object was created |
|
|
| objectFileCreation | string | true | - | The time the object file was created |
|
|
| objectFileCurrentOwnerName | string | true | - | The current owner name of the object file |
|
|
| objectFileCurrentOwnerSid | string | true | - | The current security identifier owner of the object file |
|
|
| objectFileDaclString | string | true | - | The discretionary access control list of the object file |
|
|
| objectFileExtendedAttribute | string | true | - | The extended attributes of the file |
|
|
| objectFileGroupName | string | true | - | The object file user group name |
|
|
| objectFileGroupSid | string | true | - | The security identifier of the object file group |
|
|
| objectFileHashId | string | true | - | The object file hash ID |
|
|
| objectFileHashMd5 | string | true | FileMD5 | The MD5 of the object |
|
|
| objectFileHashMd5 | string | true | FileMD5 | The md5 hash of target process image or target file |
|
|
| objectFileHashSha1 | string | true | FileSHA1 | The SHA-1 of the objectFilePath object |
|
|
| objectFileHashSha1 | string | true | FileSHA1 | The SHA1 hash of target process image or target file |
|
|
| objectFileHashSha256 | string | true | FileSHA2 | The SHA-256 of the object (objectFilePath) |
|
|
| objectFileHashSha256 | string | true | FileSHA2 | The SHA256 hash of target process image or target file |
|
|
| objectFileIsRemoteAccess | bool | true | - | The remote access to the object file | - |
|
| objectFileModified | string | true | - | The UTC time that the object was modified |
|
|
| objectFileModifiedTime | string | true | - | The time the object file was modified |
|
|
| objectFileName | string | true | FileName | The object file name |
|
|
| objectFileOriginalName | string | true | FileName | The original file name of the object image |
|
|
| objectFileOwnerName | string | true | - | The object file owner name |
|
|
| objectFileOwnerSid | string | true | - | The security identifier of the object file owner |
|
|
| objectFilePath | string | true | FileFullPath | The file path of the target process image or target file |
|
|
| objectFilePath | string | true |
|
The file path of the target process image or target file |
|
|
| objectFileRemoteAccess | bool | true | - | The remote access for the object file | - |
|
| objectFileSaclString | string | true | - | The system access control list of the object file |
|
|
| objectFileSize | string | true | - | The file size of the object file |
|
|
| objectFirstRecorded | string | true | - | The first time that the object appeared | - | Apex One as a Service |
| objectFirstSeen | string | true | - | The first time the object was seen |
|
|
| objectHashId | long | false | - | The object hash ID |
|
|
| objectHostName | string | true | DomainName | Server name where Internet event was detected |
|
|
| objectId | string | true | - | The UUID of the object |
|
|
| objectIntegrityLevel | int | true | - | Integrity level of target process | - |
|
| objectIp | string | true |
|
IP address of internet event | 10.10.10.10 |
|
| objectIps | dynamic | true |
|
IP address list of internet event |
|
|
| objectLastSeen | string | true | - | The last time the object was seen |
|
|
| objectLaunchTime | string | true | - | The object launch time of the Windows event |
|
|
| objectLoginOutFailureMessage | string | true | - | The sign-in/sign-out error message | Login incorrect |
|
| objectLoginOutFirstSeen | long | true | - | The first time the object sign-in/sign-out was seen | 1713903612 |
|
| objectLoginOutHashId | long | true | - | The FNV of the object sign-in/sign-out meta | -8981232070268295229 |
|
| objectLoginOutLastSeen | long | true | - | The last time the object sign-in/sign-out was seen | 1713903612 |
|
| objectLoginOutMetaType | int | true | - | The sign-in/sign-out meta | 1 - LOGIN_OUT_META_TYPE_OPENSSH |
|
| objectLoginOutSessionId | long | true | - | The sign-in/sign-out session ID | 260 |
|
| objectLoginOutSourceAddress | string | true | - | The sign-in/sign-out source IP | 10.10.10.10 |
|
| objectLoginOutStatus | int | true | - | The sign-in/sign-out status | -1 |
|
| objectName | string | true | - | The base name of the object file or process | net.exe |
|
| objectName | string | true | - | The object name |
|
|
| objectPid | int | false | - | The object process PID |
|
|
| objectPid | int | true | - | The PID of target process | - |
|
| objectPort | int | true | Port | The port number used by internet event | - |
|
| objectProcessHashId | long | true | - | FNV of target process |
|
|
| objectRawDataSize | dynamic | true | - | The raw data size of the Windows event object |
|
|
| objectRawDataStr | dynamic | true | - | The data contents of the AMSI event |
|
|
| objectRegistryData | string | true | RegistryValueData | The registry data contents | C:\Program Files\AlertMedia\AlertMedia Desktop Notifications\AlertMedia.exe |
|
| objectRegistryData | string | true | RegistryValueData | The registry value data |
|
|
| objectRegistryKeyHandle | string | true | RegistryKey | The registry key path |
|
|
| objectRegistryKeyHandle | string | true | RegistryKey | The registry key |
|
|
| objectRegistryRoot | int | false | - | The Windows Registry Root ID |
|
|
| objectRegistryValue | string | true | RegistryValue | The registry value name |
|
|
| objectRegistryValue | string | true | RegistryValue | Registry value name |
|
|
| objectRegType | int | false | - | The Windows Registry Type ID |
|
|
| objectRunAsLocalAccount | bool | true | - | The "runas" command uses a local account |
|
|
| objectSessionId | string | true | - | The object session ID |
|
|
| objectSigner | dynamic | true | - | The list of object process signers |
|
|
| objectSigner | dynamic | true | - | Certificate signer of object process or file |
|
|
| objectSignerFlagsAdhoc | dynamic | true | - | The list of object process signature adhoc flags | - |
|
| objectSignerFlagsAdhoc | dynamic | true | - | The list of object process or file signature adhoc flags | - |
|
| objectSignerFlagsLibValid | dynamic | true | - | The list of object process signature library validation flags | - |
|
| objectSignerFlagsLibValid | dynamic | true | - | The list of object process or file signature library validation flags | - |
|
| objectSignerFlagsRuntime | dynamic | true | - | The list of object process signature runtime flags | - |
|
| objectSignerFlagsRuntime | dynamic | true | - | The list of object process or file signature runtime flags | - |
|
| objectSignerValid | dynamic | true | - | Validity of certificate signer |
|
|
| objectSubTrueType | int | true | - | File object's true sub-type |
|
|
| objectThreadId | string | true | - | The object process thread ID |
|
Apex One as a Service |
| objectTrueType | int | true | - | File object's true major type |
|
|
| objectType | string | true | - | The object type |
|
|
| objectUser | string | true | UserAccount | The owner name of the target process or the login user name |
|
|
| objectUser | string | true | UserAccount | The owner name of the target process or the login user name |
|
|
| objectUserDomain | string | true | - | The owner domain of the target process |
|
|
| objectUserDomain | string | false | - | The object user domain |
|
|
| objectUserGroup | string | true | - | The user group name |
|
|
| online | string | true | - | The flag to identify whether the endpoint is online |
|
Apex One as a Service |
| operationLevel | int | false | - | The level that is used to indicate the handler layer at SOC |
|
Apex One as a Service |
| originalFileHashes | dynamic | true | FileSHA1 | The hashes of the original file |
|
|
| originalFilePaths | dynamic | true |
|
The paths of the original file | C:\\Users\\user_name\\Downloads\\run.exe |
|
| osDescription | string | true | - | The OS version |
|
|
| osName | string | true | - | The host operating system name |
|
|
| osType | string | true | - | The host operating system type |
|
|
| osVer | string | true | - | The version of the host operating system |
|
|
| parentAuthId | string | true | - | The parent authorization ID |
|
|
| parentCmd | string | true | CLICommand | The command line entry of the parent process |
|
|
| parentFileCreation | string | true | - | The time the parent file was created |
|
|
| parentFileCurrentOwnerName | string | true | - | The current owner name of the parent file |
|
|
| parentFileCurrentOwnerSid | string | true | - | The current security identifier owner of the parent file |
|
|
| parentFileDaclString | string | true | - | The discretionary access control list of the parent file |
|
|
| parentFileGroupName | string | true | - | The name of the parent file user group |
|
|
| parentFileGroupSid | string | true | - | The security identifier of the parent process file group |
|
|
| parentFileHashId | long | true | - | The parent file hash ID |
|
|
| parentFileHashMd5 | string | true | FileMD5 | The md5 hash of parent process |
|
|
| parentFileHashSha1 | string | true | FileSHA1 | The SHA1 hash of parent process |
|
|
| parentFileHashSha256 | string | true | FileSHA2 | The SHA256 hash of parent process |
|
|
| parentFileModifiedTime | string | true | - | The time the parent file was modified |
|
|
| parentFileOriginalName | string | true | FileName | The original file name of the parent image |
|
|
| parentFileOwnerName | string | true | - | The owner name of the parent file |
|
|
| parentFileOwnerSid | string | true | - | The security identifier of the parent file owner |
|
|
| parentFilePath | string | true |
|
The file path of the parent process |
|
|
| parentFileRemoteAccess | bool | true | - | The remote access to the parent file | - |
|
| parentFileSaclString | string | true | - | The system access control list of the parent file |
|
|
| parentFileSize | string | true | - | The file size of the parent file |
|
|
| parentHashId | long | true | - | The parent hash ID |
|
|
| parentIntegrityLevel | int | true | - | The integrity level of a parent | - |
|
| parentLaunchTime | real | true | - | The time when the parent process was launched |
|
|
| parentName | string | true | - | The image name of the parent process |
|
|
| parentPid | int | true | - | The PID of the parent process |
|
|
| parentSessionId | int | false | - | The parent session ID | - |
|
| parentSigner | dynamic | true | - | The signer of the parent file |
|
|
| parentSignerFlagsAdhoc | dynamic | true | - | The list of parent process signature adhoc flags | - |
|
| parentSignerFlagsAdhoc | dynamic | true | - | The list of parent process signature adhoc flags | - |
|
| parentSignerFlagsLibValid | dynamic | true | - | The list of parent process signature library validation flags | - |
|
| parentSignerFlagsLibValid | dynamic | true | - | The list of parent process signature library validation flags | - |
|
| parentSignerFlagsRuntime | dynamic | true | - | The list of parent process signature runtime flags | - |
|
| parentSignerFlagsRuntime | dynamic | true | - | The list of parent process signature runtime flags | - |
|
| parentSignerValid | dynamic | true | - | The validity of the parent signer | - |
|
| parentSubTrueType | int | true | - | The true file subtype of the parent file | - |
|
| parentTrueType | int | true | - | The true file type of the parent file | - |
|
| parentUser | string | true | - | The type of user that executed the parent process |
|
|
| parentUserDomain | string | true | - | The user domain of the parent process |
|
|
| patType | string | true | - | The pattern type |
|
Apex One as a Service |
| patVer | string | true | - | The version of the behavior pattern |
|
|
| pComp | string | true | - | The component that made the detection |
|
|
| peerIp | dynamic | true |
|
The IP of peerHost | 10.10.10.10 |
|
| plang | int | false | - | The product language |
|
|
| platformAssetTags | dynamic | true | - | The list of platform custom asset tags | {"Asset group":["finance"], "some.ip": ["10.1.0.1"]} |
|
| platformAssetTags | dynamic | true | - | The list of platform custom asset tags | {"Asset group":["finance"], "some.ip": ["10.1.0.1"]} |
|
| pname | string | true | - | The internal product ID |
|
|
| pname | string | true | - | Internal product ID (Deprecated, use productCode) |
|
|
| policyId | string | true | - | The policy ID of which the event was detected |
|
|
| policyName | string | true | - | The name of the triggered policy |
|
|
| policyTemplate | dynamic | true | - | The one-to-many data structure |
|
|
| pplat | int | false | - | The product platform |
|
|
| processArtifactIds | dynamic | true | - | The artifact IDs generated by processAction |
|
|
| processCmd | string | true | CLICommand | The subject process command line |
|
|
| processCmd | string | true | CLICommand | The command line entry of the subject process |
|
|
| processFileCreation | string | true | - | The time the process file was created |
|
|
| processFileCurrentOwnerName | string | true | - | The current owner name of the process file |
|
|
| processFileCurrentOwnerSid | string | true | - | The owner of the process file current security identifier |
|
|
| processFileDaclString | string | true | - | The discretionary access control list of the process file |
|
|
| processFileGroupName | string | true | - | The name of the process file user group |
|
|
| processFileGroupSid | string | true | - | The security identifier of the process file group |
|
|
| processFileHashId | long | true | - | The file hash of the process |
|
|
| processFileHashMd5 | string | true | FileMD5 | The MD5 hash of the subject process image |
|
|
| processFileHashSha1 | string | true | FileSHA1 | The SHA-1 of the subject process |
|
|
| processFileHashSha1 | string | true | FileSHA1 | The SHA1 hash of subject process image |
|
|
| processFileHashSha256 | string | true | FileSHA2 | The SHA256 hash of subject process image |
|
|
| processFileModifiedTime | string | true | - | The time the process file was modified |
|
|
| processFileOriginalName | string | true | FileName | The original file name of the process image |
|
|
| processFileOwnerName | string | true | - | The process file owner name |
|
|
| processFileOwnerSid | string | true | - | The security identifier of the process file owner |
|
|
| processFilePath | string | true |
|
The file path of the subject process |
|
|
| processFilePath | string | true |
|
The file path of the subject process |
|
|
| processFileRemoteAccess | bool | true | - | The remote access to the process file | - |
|
| processFileSaclString | string | true | - | The system access control list of the process file |
|
|
| processFileSize | string | true | - | The file size of the process file |
|
|
| processHashId | long | true | - | The FNV of subject process |
|
|
| processImageFileNames | dynamic | true | - | The process image file names of detected backup artifacts |
|
|
| processLaunchTime | real | true | - | The time the subject process was launched |
|
|
| processName | string | true | ProcessName | The image name of the process that triggered the event |
|
|
| processName | string | true | ProcessName | The image name of the process that triggered the event |
|
|
| processPid | int | true | - | The PID of the subject process | - |
|
| processPid | int | true | - | The PID of the subject process |
|
|
| processSigner | dynamic | true | - | The process file signer |
|
|
| processSignerFlagsAdhoc | dynamic | true | - | The list of process signature adhoc flags | - |
|
| processSignerFlagsAdhoc | dynamic | true | - | The list of process signature adhoc flags | - |
|
| processSignerFlagsLibValid | dynamic | true | - | The list of process signature library validation flags | - |
|
| processSignerFlagsLibValid | dynamic | true | - | The list of process signature library validation flags | - |
|
| processSignerFlagsRuntime | dynamic | true | - | The list of process signature runtime flags | - |
|
| processSignerFlagsRuntime | dynamic | true | - | The list of process signature runtime flags | - |
|
| processSignerValid | dynamic | true | - | The validity of the process signer |
|
|
| processSubTrueType | int | true | - | The true file subtype of the process | - |
|
| processTrueType | int | true | - | The true file type of the process | - |
|
| processUser | string | true | UserAccount | The user name of the process or the file creator |
|
|
| processUser | string | true | UserAccount | The owner name of subject process image |
|
|
| processUserDomain | string | true | - | The owner domain of the subject process image |
|
|
| processUserDomain | string | true | - | The process user domain |
|
|
| proto | string | true | - | The exploited layer network protocol |
|
|
| proto | int | false | - | The protocol type |
|
|
| providerGUID | string | true | - | The GUID of the Windows event provider | {11111111-1111-1111-1111-111111111111} |
|
| providerName | string | true | - | The name of the Windows event provider |
|
|
| proxy | string | true | - | The proxy address |
|
|
| pver | string | true | - | The product version |
|
|
| pver | string | true | - | The product version |
|
|
| quarantineFileId | string | true | - | The unique identifier of the quarantined object | ASLUMVS0.4FC |
|
| quarantineFilePath | string | true | FileFullPath | The file path of the quarantined object | C:\ProgramData\Trend Micro\AMSP\quarantine\ASLUMVS0.4FC |
|
| quarantineFileSha256 | string | true | FileSHA2 | The SHA-256 of the quarantined object | 84B2FA19B05EA88D6E785B4ADB528120485AA3F72F3E5E114DE6D3696B0D151F |
|
| quarantineType | string | true | - | The descriptive name for the quarantine area |
|
Apex One as a Service |
| rating | string | true | - | The credibility level |
|
|
| rawDataSize | string | true | - | The size of the Windows event log |
|
|
| rawDataStr | string | true | - | Windows event raw contents |
|
|
| remarks | string | true | - | The additional information |
|
|
| request | string | true | URL | The notable URLs |
|
|
| request | string | true | URL | Request URL |
|
|
| requestClientApplication | string | true | - | The protocol user agent information |
|
|
| requestMethod | string | true | - | The network protocol request method |
|
|
| riskConfidenceLevel | string | true | - | The risk confidence level |
|
|
| riskLevel | string | true | - | The risk level |
|
|
| rt | string | false | - | The Unix time of the log generation | 1656324260000 |
|
| rt | string | false | - | The event time | 1657781088000 |
|
| rtDate | string | true | - | The date of the log generation | 1655337600000 |
|
| rtHour | int | false | - | The hour of the log generation |
|
|
| rtWeekDay | string | true | - | The weekday of the log generation |
|
|
| ruleId | int | true | - | The rule ID |
|
|
| ruleId | int | true | - | The rule ID | 1005566 |
|
| ruleIdStr | string | true | - | The rule ID | TM-00000043 |
|
| ruleName | string | true | - | The name of the rule that triggered the event |
|
|
| ruleType | string | true | - | The access rule type |
|
|
| scanType | string | true | - | The scan type |
|
|
| score | int | false | - | The Web Reputation Services URL rating |
|
|
| secondAct | string | true | - | The second scan action |
|
|
| secondActResult | string | true | - | The result of the second scan action |
|
|
| senderGUID | string | true | - | The sender GUID |
|
|
| senderIp | dynamic | true | - | The sender IP | 10.10.10.10 |
|
| sessionId | int | false | - | The session ID |
|
|
| severity | int | true | - | The severity of the event |
|
|
| signer | string | true | - | The signer of the file | Shenzhen Smartspace Software technology Co.,Limited;Symantec Class 3 SHA256 Code Signing CA;1429491600;1492649999 | Apex One as a Service |
| smac | string | true | - | The source MAC address |
|
|
| sourceType | string | true | - | The source type |
|
|
| spt | int | true | Port | The source port |
|
|
| spt | int | true | Port | The source port number |
|
|
| src | dynamic | true |
|
The source IP | 10.10.10.10 |
|
| src | string | true |
|
The source address |
|
|
| srcFileCreation | string | true | - | The time the source file was created |
|
|
| srcFileCurrentOwnerName | string | true | - | The current owner name of the source file |
|
|
| srcFileCurrentOwnerSid | string | true | - | The current security identifier owner of the source file |
|
|
| srcFileDaclString | string | true | - | The discretionary access control list of the source file |
|
|
| srcFileGroupName | string | true | - | The source file user group name |
|
|
| srcFileGroupSid | string | true | - | The security identifier of the source file group |
|
|
| srcFileHashId | long | false | - | The source file hash ID |
|
|
| srcFileHashMd5 | string | true | FileMD5 | The md5 hash of source file |
|
|
| srcFileHashSha1 | string | true | FileSHA1 | The SHA1 hash of source file |
|
|
| srcFileHashSha256 | string | true | FileSHA2 | The SHA256 hash of source file |
|
|
| srcFileIsRemoteAccess | bool | true | - | The remote access of the source file | - |
|
| srcFileModifiedTime | string | true | - | The time the source file was modified |
|
|
| srcFileOwnerName | string | true | - | The source file owner name |
|
|
| srcFileOwnerSid | string | true | - | The security identifier of the source file owner |
|
|
| srcFilePath | string | true |
|
The source file path |
|
|
| srcFileSaclString | string | true | - | The system access control list of the source file |
|
|
| srcFileSize | string | true | - | The file size of the source file |
|
|
| srcFirstSeen | string | true | - | The first time the source file was seen |
|
|
| srcHashId | long | false | - | The source hash ID |
|
|
| srcLastSeen | string | true | - | The last time the source file was seen |
|
|
| srcSigner | dynamic | true | - | The signer of the source file |
|
|
| srcSignerFlagsAdhoc | dynamic | true | - | The list of source file signature adhoc flags | - |
|
| srcSignerFlagsLibValid | dynamic | true | - | The list of source file signature library validation flags | - |
|
| srcSignerFlagsRuntime | dynamic | true | - | The list of source file signature runtime flags | - |
|
| srcSignerValid | dynamic | true | - | The validity of the source file signer | - |
|
| srcSubTrueType | int | false | - | The true file subtype of the source file | - |
|
| srcTrueType | int | false | - | The true file type of the source file | - |
|
| status | string | true | - | The HTTP response status code |
|
|
| subSystem | string | true | - | The sub system information | com.apple.xpc |
|
| suid | string | true | UserAccount | User name or mailbox |
|
|
| suser | dynamic | true | EmailSender | The email sender | sample_email@trendmicro.com |
|
| tacticId | dynamic | true | Tactic | The list of MITRE tactic IDs |
|
|
| tags | dynamic | true |
|
The detected technique ID based on the alert filter |
|
|
| threatName | string | true | - | The threat name |
|
|
| threatType | string | true | - | The log threat type |
|
|
| timezone | string | true | - | The host time zone |
|
|
| trigger | string | true | - | The action trigger |
|
|
| triggerInfo | dynamic | true | - | The trigger information | [{'triggerModule': 'ODS', 'triggerReason': 'System Schedule Scan'}] |
|
| triggerReason | string | true | - | The cause of the triggered action |
|
|
| urlCat | dynamic | true | - | The requested URL category |
|
|
| userDomain | string | true |
|
The user domain |
|
|
| userDomain | dynamic | true | - | The user domain name |
|
|
| vendor | string | true | - | The device vendor | adata |
|
| winEventId | int | true | - | Event ID of Windows event |
|
|
Generated by XDR Common Schema Public Doc Generator V2