Data Structure Examples

This appendix contains data structure examples for selected intrusion, correlation, and discovery events. Each example is displayed in binary format to clearly display how each bit is set.

See the following sections for more information:

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#62939">Intrusion Event Data Structure Examples

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#66190">Discovery Data Structure Examples

Intrusion Event Data Structure Examples

This section contains examples of data structures that may be transmitted by eStreamer for intrusion events. The following examples are provided:

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#54389">Example of an Intrusion Event for the Defense Center 5.3 +

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#37784">Example of an Intrusion Impact Alert

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#49094">Example of a Packet Record

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#28253">Example of a Classification Record for 4.6.1+

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#86915">Example of a Priority Record

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#34810">Example of a Rule Message Record for 4.6.1+

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#76939">Example of a Version 4.0 Correlation Policy Violation Event

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#16570">Example of a Version 4.5 - 4.6.1 Correlation Event

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#29634">Example of a Version 4.10 Correlation Event

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#96719">Example of a Version 5.1+ User Event

 

Example of an Intrusion Event for the Defense Center 5.3 +

The following diagram shows an example event record:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

1

1

0

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

0

1

0

0

0

0

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

1

1

1

0

E

0

1

0

1

0

0

1

0

1

1

1

1

0

0

1

0

1

0

0

1

0

0

0

1

1

0

0

1

1

1

0

0

F

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

G

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

1

H

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

1

1

1

0

I

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

J

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

0

1

1

1

1

1

0

0

0

1

K

0

1

0

1

0

0

1

0

1

1

1

1

0

0

1

0

1

0

0

1

0

0

0

1

0

0

0

1

1

0

1

1

L

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

0

0

0

0

0

1

0

0

0

1

1

1

0

0

0

M

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

1

0

1

1

0

1

0

0

1

0

1

N

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

O

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

P

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

1

Q

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

R

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

0

0

0

 

0

0

0

1

0

1

1

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

S

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

0

1

0

0

0

0

 

0

0

1

1

0

1

1

1

0

0

0

0

1

0

1

1

1

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

T

1

1

1

1

1

1

1

0

1

1

1

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

0

1

U

0

0

0

1

0

0

0

1

0

1

0

0

0

1

1

1

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

0

V

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

0

0

0

W

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

0

0

0

X

0

1

0

0

0

0

1

1

1

0

1

1

0

1

1

1

0

1

0

0

1

1

0

0

1

1

0

0

1

1

0

1

 

0

1

1

0

1

0

1

1

1

0

1

1

1

1

0

1

0

1

0

1

0

0

1

0

1

0

1

1

0

0

1

1

 

0

0

0

0

1

0

1

0

0

1

1

0

1

1

1

0

1

0

1

0

1

0

0

1

1

0

0

1

1

1

1

0

 

1

1

1

1

1

1

0

1

0

1

0

1

0

0

0

1

1

1

0

0

0

0

0

0

0

0

1

0

1

1

1

0

Y

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Z

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AA

0

1

1

1

0

1

1

1

0

0

1

1

0

1

0

1

1

0

0

1

0

1

1

0

0

1

1

0

1

0

0

1

AB

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

1

0

1

0

0

1

AC

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

AD

1

0

1

1

0

0

1

0

0

0

1

0

0

0

1

1

1

0

1

0

1

0

1

0

0

0

1

0

0

1

0

0

 

1

0

0

0

0

1

1

1

1

0

0

0

0

1

0

1

0

0

0

1

0

0

0

1

1

1

1

0

0

0

1

1

 

1

0

1

0

1

0

0

0

0

0

1

0

1

0

1

1

1

1

0

1

1

0

1

1

0

0

0

1

1

0

0

1

 

1

0

0

0

0

0

1

0

1

0

0

1

1

0

0

1

1

0

0

1

1

1

1

0

1

0

1

1

1

0

1

1

AE

0

0

0

0

0

0

1

0

1

1

0

0

1

1

0

0

1

1

0

1

1

0

1

0

1

0

0

1

0

1

0

0

 

0

1

1

1

1

1

0

1

0

1

1

0

1

0

0

1

0

0

0

1

0

0

0

1

1

1

1

0

0

0

1

1

 

1

0

0

0

1

1

1

1

0

0

1

1

1

0

0

1

1

0

0

0

1

1

1

0

1

0

1

0

1

1

1

1

 

0

1

1

0

0

0

1

1

1

0

1

0

0

0

0

0

1

0

0

1

0

0

0

1

0

1

1

1

1

0

0

0

AF

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AG

0

0

0

0

0

0

1

0

1

1

1

0

1

0

0

1

0

1

0

1

0

0

0

0

0

1

1

1

1

0

1

0

 

0

1

1

1

1

1

0

1

0

1

1

0

1

0

0

1

0

0

0

1

0

0

0

1

1

1

1

0

0

0

1

1

 

1

0

0

0

1

1

1

1

0

0

1

1

1

0

0

1

1

0

0

0

1

1

1

0

1

0

1

0

1

1

1

1

 

0

1

1

0

0

0

1

1

1

0

1

0

0

0

0

0

1

0

0

1

0

0

0

1

0

1

1

1

1

0

0

0

AH

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AI

0

1

0

1

0

0

1

0

1

1

1

1

0

0

1

0

1

0

0

1

0

0

0

1

0

0

0

1

1

0

1

1

AJ

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

0

0

0

1

1

0

1

0

0

1

0

1

0

AK

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AL

0

0

0

0

0

0

0

0

1

0

0

1

1

1

0

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

In the preceding example, the following event information appears:

  1. The first two bytes of this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 238 bytes long.
  3. This line indicates a record type value of 400, which represents an intrusion event record.
  4. This line indicates that the event record that follows is 222 bytes long.
  5. This line is the timestamp when the event was saved. In this case, it was saved on Wednesday, February 5, 2014 at 19:31:40.
  6. This line is reserved for future use and is populated with zeros.
  7. This line indicates that the block type is 41, which is the block type for Intrusion Event records.
  8. This line indicates that the data block is 222 bytes long.
  9. This line indicates that the event is collected from sensor number 2.
  10. This line indicates that the event identification number is 11761.
  11. This line indicates that the event occurred at second 1391628571.
  12. This line indicates that the event occurred at microsecond 950840.
  13. This line indicates that the rule ID number is 28069.
  14. This line indicates that the event was detected by generator ID number 1, the rules engine.
  15. This line indicates that the rule revision number is 1.
  16. This line indicates that the classification identification number is 35.
  17. This line indicates that the priority identification number is 1.
  18. This line indicates that the source IP address is 10.22.8.11. Note that this field can contain either IPv4 or IPv6 addresses.
  19. This line indicates that the destination IP address is 61.55.184.10. Note that this field can contain either IPv4 or IPv6 addresses.
  20. The first two bytes in this line indicate that the source port number is 65268, and the second two bytes indicate that the destination port number is 53.
  21. This first byte in this line indicates that UDP (17) is the protocol used in the event. The second byte is the impact flag, which indicates that the event is red (vulnerable) since the second bit is 1; that the event caused the managed event to drop the session, that the source destination host is potentially compromised, and that there is a vulnerability mapped to the client. The third byte in this line indicates that either the source or destination host is monitored by the system and is in the network map, indicating a priority 1 event (red). The last byte indicates that the event was blocked.
  22. This line contains the MPLS label, if present.
  23. The first two bytes in this line indicate that the VLAN ID is 2. The last two bytes are reserved and set to 0.
  24. This line contains the unique ID number for the intrusion policy.
  25. This line contains the internal identification number for the user. Since there is no applicable user, it is all zeros.
  26. This line contains the internal identification number for the web application. Since there is no web application, it is all zeros.
  27. This line contains the internal identification number for the client application, which is 2000000617.
  28. This line contains the internal identification number for the application protocol, which is 617.
  29. This line contains the unique identifier for the access control rule, which is 1.
  30. This line contains the unique identifier for the access control policy.
  31. This line contains the unique identifier for the ingress interface.
  32. This line contains unique identifier for the egress interface. Since this event was blocked, there is no egress interface and the field is populated with zeros.
  33. This line contains the unique identifier for the ingress security zone.
  34. This line contains the unique identifier for the egress security zone. Since this event was blocked, there is no egress interface and the field is populated with zeros.
  35. This line contains the Unix timestamp of the connection event associated with the intrusion event.
  36. The first two bytes in this line indicate the numerical ID of the Snort instance on the managed device that generated the connection event. The remaining two bytes indicate the value used to distinguish between connection events that happen during the same second.
  37. The first two bytes in this line indicate the code for the country of the source host. The remaining two bytes indicate the code for the country of the destination host.
  38. This line indicates the ID number of the compromise associated with this event, if any.

Example of an Intrusion Impact Alert

The following diagram shows an example intrusion impact alert record:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

1

0

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

0

1

0

E

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

F

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

0

1

0

G

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

0

0

1

0

0

1

0

0

0

1

0

1

0

0

0

H

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

I

0

1

0

0

0

0

0

0

1

1

0

0

1

1

0

1

1

0

1

1

0

1

1

1

1

0

0

1

0

1

0

0

J

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

K

1

0

1

0

1

1

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

0

1

1

0

L

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

M

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

N

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

0

O

0

1

0

1

0

1

1

0

0

1

1

1

0

1

0

1

0

1

1

0

1

1

0

0

0

1

1

0

1

1

1

0

 

0

1

1

0

0

1

0

1

0

1

1

1

0

0

1

0

0

1

1

0

0

0

0

1

0

1

1

0

0

0

1

0

 

0

1

1

0

1

1

0

0

0

1

1

0

0

1

0

1

 

In the preceding example, the following information appears:

  1. The first two bytes of this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 58 bytes long.
  3. This line indicates a record type value of 9, which represents an intrusion impact alert record.
  4. This line indicates that the data that follows is 50 bytes long.
  5. This line contains a value of 20, indicating that an intrusion impact alert data block follows.
  6. This line indicates that the length of the impact alert block, including the impact alert block header, is 50 bytes.
  7. This line indicates that the event identification number is 201256.
  8. This line indicates that the event is collected from device number 2.
  9. This line indicates that the event occurred at second 1087223700.
  10. This line indicates that 1 (red, vulnerable) is the impact level associated with the event.
  11. This line indicates that the IP address associated with the violation event is 172.16.1.22.
  12. This line indicates that there is no destination IP address associated with the violation (values are set to 0).
  13. This line indicates that a string block follows, containing a string block length and a text string which, in this case, contains the impact name. For more information about string blocks, see String Data Block.
  14. This line indicates that the total length of the string block, including the string block indicator and length is 18 bytes. This includes 10 bytes for the impact description and 8 bytes for the string header.
  15. This line indicates that the description of the impact is “Vulnerable.”

Example of a Packet Record

The following diagram shows an example packet record:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

0

1

1

1

0

1

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

0

1

0

1

0

1

E

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

F

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

1

1

1

0

1

1

0

1

1

0

0

1

1

0

G

0

0

1

1

1

1

1

1

0

0

0

0

0

1

0

0

0

1

1

1

1

1

1

1

0

1

1

1

0

0

1

0

H

0

0

1

1

1

1

1

1

0

0

0

0

0

1

0

0

0

1

1

1

1

1

1

1

0

1

1

1

0

1

0

0

I

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

1

0

0

0

0

1

1

0

0

1

1

1

0

1

J

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

K

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

1

1

0

0

1

L

0

0

1

1

0

0

0

0

0

1

1

1

1

0

0

0

0

0

1

1

0

0

0

0

0

0

1

1

0

0

0

0

 

0

0

1

1

0

0

0

0

0

0

1

1

0

0

0

0

0

0

1

1

1

0

1

0

0

0

1

0

0

0

0

0

In the preceding example, the following packet information appears:

  1. The first two bytes of this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 989 bytes long.
  3. This line indicates a record type value of 2, which represents a packet record.
  4. This line indicates that the packet record that follows is 981 bytes long.
  5. This line indicates that the event is collected from device number 3.
  6. This line indicates that the event identification number is 195430.
  7. This line indicates that the event occurred at second 1057259378.
  8. This line indicates that the packet was collected at second 1057259380.
  9. This line indicates that the packet was collected at microsecond 254365.
  10. This line indicates that the link type is 1 (Ethernet layer).
  11. This line indicates that the packet data that follows is 953 bytes long.
  12. This line and the following line show the actual payload data. Note that the actual data is 953 bytes and has been truncated for the sake of this example.

Example of a Classification Record for 4.6.1+

The following diagram shows an example classification record:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

1

0

0

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

1

1

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

1

0

0

E

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

F

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

1

1

0

1

0

0

0

1

1

1

0

0

1

0

 

0

1

1

0

1

1

1

1

0

1

1

0

1

0

1

0

0

1

1

0

0

0

0

1

0

1

1

0

1

1

1

0

 

0

0

1

0

1

1

0

1

0

1

1

0

0

0

0

1

0

1

1

0

0

0

1

1

0

1

1

1

0

1

0

0

 

0

1

1

0

1

0

0

1

0

1

1

1

0

1

1

0

0

1

1

0

1

0

0

1

0

1

1

1

0

1

0

0

G

0

1

1

1

1

0

0

1

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

0

1

0

0

0

0

0

1

 

0

0

1

0

0

0

0

0

0

1

0

0

1

1

1

0

0

1

1

0

0

1

0

1

0

1

1

1

0

1

0

0

 

0

1

1

1

0

1

1

1

0

1

1

0

1

1

1

1

0

1

1

1

0

0

1

0

0

1

1

0

1

0

1

1

 

0

0

1

0

0

0

0

0

0

1

0

1

0

1

0

0

0

1

1

1

0

0

1

0

0

1

1

0

1

1

1

1

 

0

1

1

0

1

0

1

0

0

1

1

0

0

0

0

1

0

1

1

0

1

1

1

0

0

0

1

0

0

0

0

0

 

0

1

1

1

0

1

1

1

0

1

1

0

0

0

0

1

0

1

1

1

0

0

1

1

0

0

1

0

0

0

0

0

 

0

1

0

0

0

1

0

0

0

1

1

0

0

1

0

1

0

1

1

1

0

1

0

0

0

1

1

0

0

1

0

1

 

0

1

1

0

0

0

1

1

0

1

1

1

0

1

0

0

0

1

1

0

0

1

0

1

0

1

1

0

0

1

0

0

H

1

0

0

1

1

1

0

1

1

1

0

0

0

1

1

0

0

0

0

0

0

1

0

1

1

1

1

0

1

0

0

0

 

1

1

0

0

1

0

1

1

1

0

1

0

0

0

1

0

0

0

0

1

0

0

0

1

1

1

0

1

1

0

0

1

 

1

0

0

0

1

0

0

1

1

1

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

0

0

 

0

1

0

1

0

1

1

0

0

0

0

0

0

1

0

0

0

0

0

0

0

1

0

1

0

0

0

0

0

0

0

1

I

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

In the preceding example, the following event information appears:

  1. The first two bytes of the line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 92 bytes long.
  3. This line indicates a record type value of 67, which represents a classification record.
  4. This line indicates that the classification record that follows is 84 bytes long.
  5. This line indicates that the Classification ID is 35.
  6. The first two bytes of this line indicate that the classification name that follows it is 15 bytes long. The second two bytes begin the classification name itself, which, in this case, is “trojan-activity”.
  7. The first byte in this line is a continuation of the classification name described in F. The next two bytes in this line indicate that the classification description that follows it is 29 bytes long. The remaining bye begin the classification description, which, in this case, is “A Network Trojan was Detected.”
  8. This line indicates the classification ID number that acts as a unique identifier for the classification.
  9. This line indicates the classification revision ID number that acts as a unique identifier for the classification revision, which is null because there are no revisions to the classification.

Example of a Priority Record

The following example shows a sample priority record:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

E

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

F

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

1

0

1

0

0

0

0

1

1

0

1

0

0

1

 

0

1

1

0

0

1

1

1

0

1

1

0

1

0

0

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

In the preceding example, the following event information appears:

  1. The first two bytes in this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 16 bytes.
  3. This line indicates a record type value of 4, which represents a priority record.
  4. This line indicates that the priority record that follows is 8 bytes long.
  5. This line indicates that the priority ID is one.
  6. The first two bytes of this line indicate that there are four bytes included in the priority name. The second two bytes plus the two bytes on the following line show the priority name itself (“high”).

Example of a Rule Message Record for 4.6.1+

The following example shows a sample rule record:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

1

0

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

0

0

1

E

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

F

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

1

0

1

1

0

1

0

0

1

0

1

G

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

H

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

1

0

1

1

0

1

0

0

1

0

1

I

0

0

0

0

0

0

0

0

0

1

0

0

0

1

1

1

1

0

1

1

0

1

1

0

0

0

1

1

0

1

1

1

 

0

0

1

0

0

1

1

1

0

0

1

1

1

0

0

1

0

0

1

0

0

1

1

0

0

0

0

1

1

1

1

1

 

0

0

0

1

0

0

0

1

1

1

1

0

0

0

1

1

1

0

1

1

0

0

0

0

0

0

0

0

1

0

0

1

 

1

0

0

0

0

1

0

0

1

0

0

0

1

1

1

1

0

1

1

0

1

0

0

1

1

1

1

0

0

0

1

1

J

0

1

1

0

1

1

0

1

1

1

0

1

0

0

1

0

1

0

1

1

0

1

1

0

0

0

1

1

0

1

1

1

 

0

0

1

0

1

0

1

0

1

0

1

0

0

1

0

1

0

0

1

0

0

1

1

0

0

0

0

1

1

1

1

1

 

0

0

0

1

0

0

0

1

1

1

1

0

0

0

1

1

1

0

1

1

0

0

0

0

0

0

0

0

1

0

0

1

 

1

0

0

0

0

1

0

0

1

0

0

0

1

1

1

1

0

1

1

0

1

0

0

1

1

1

1

0

0

0

1

1

K

0

1

1

0

1

1

0

1

1

1

0

1

0

0

1

0

0

1

0

0

0

0

0

1

0

1

0

1

0

0

0

0

 

0

1

0

1

0

0

0

0

0

0

1

0

1

1

0

1

0

1

0

0

0

1

0

0

0

1

0

0

0

1

0

1

 

0

1

0

1

0

1

0

0

0

1

0

0

0

1

0

1

0

1

0

0

0

0

1

1

0

1

0

1

0

1

0

0

 

0

0

1

0

0

0

0

0

0

1

0

0

0

1

0

0

0

1

0

0

1

1

1

0

0

1

0

1

0

0

1

1

 

0

0

1

0

0

0

0

0

0

1

1

1

0

0

1

0

0

1

1

0

0

1

0

1

0

1

1

1

0

0

0

1

 

0

1

1

1

0

1

0

1

0

1

1

0

0

1

0

1

0

1

1

1

0

0

1

1

0

1

1

1

0

1

0

0

 

0

0

1

0

0

0

0

0

0

1

1

0

0

1

1

0

0

1

1

0

1

1

1

1

0

1

1

1

0

0

1

0

 

0

0

1

0

0

0

0

0

0

1

1

1

0

0

0

0

0

1

1

0

1

1

1

1

0

1

1

1

0

1

0

0

 

0

1

1

0

0

1

0

1

0

1

1

0

1

1

1

0

0

1

1

1

0

1

0

0

0

1

1

0

1

0

0

1

 

0

1

1

0

0

0

0

0

1

0

1

1

0

1

1

0

0

0

0

1

0

0

0

0

0

1

1

0

1

1

0

1

 

0

1

1

0

0

0

0

1

0

1

1

0

1

1

0

0

0

1

1

1

0

1

1

1

0

1

1

0

0

0

0

1

 

0

1

1

1

0

0

1

0

0

1

1

0

0

1

0

1

0

0

1

0

0

0

0

0

0

1

0

1

0

0

1

1

 

0

1

1

0

0

0

0

1

0

1

1

0

0

1

1

0

0

1

1

0

0

1

0

1

0

1

0

0

0

1

1

1

 

0

1

1

1

0

1

0

1

0

1

1

0

0

0

0

1

0

1

1

1

0

0

1

0

0

1

1

0

0

1

0

0

 

0

0

1

0

0

0

0

0

0

1

1

1

0

1

0

0

0

1

1

0

0

1

1

1

0

0

1

0

0

0

0

0

 

0

1

1

0

0

1

0

0

0

1

1

0

1

1

1

1

0

1

1

0

1

1

0

1

0

1

1

0

0

0

0

1

 

0

1

1

0

1

0

0

1

0

1

1

0

1

1

1

0

0

0

1

0

0

0

0

0

0

0

1

1

0

0

1

1

 

0

0

1

1

0

1

1

0

0

0

1

1

0

0

0

0

0

0

1

0

1

1

1

0

0

1

1

0

0

0

1

1

 

0

1

1

0

1

1

1

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

In the preceding example, the following event information appears:

  1. The first two bytes of this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 129 bytes.
  3. This line indicates a record type value of 66, which represents a rule message record.
  4. This line indicates that the rule message record that follows is 121 bytes long.
  5. This line indicates that the generator identification number is 1, the rules engine.
  6. This line indicates that the rule identification number is 28069.
  7. This line indicates that the rule revision number is 1.
  8. This line indicates that the rule identification number rendered to the Sourcefire 3D System is 28069.
  9. The first two bytes of this line indicate that there are 71 bytes included in the rule text name. The second two bytes begin the unique identifier number for the rule.
  10. The first two bytes of this line finish the unique identifier number of the rule. The next two bytes begin the unique identifier number for the revision of the rule.
  11. The first two bytes of this line finish the unique identifier number for the revision of the rule. The second two bytes begin the text of the rule message itself. The full text of the transmitted rule message is: “APP-DETECT DNS request for potential malware SafeGuard to domain 360.cn”.

Example of a Version 4.0 Correlation Policy Violation Event

The following diagram shows an example correlation policy violation record in Defense Center 4.0 format:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

0

0

1

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

0

0

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

E

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

F

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

G

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

H

0

1

0

0

0

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

I

0

0

0

0

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

J

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

K

0

0

0

1

1

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

L

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

M

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

N

0

0

0

1

0

1

0

1

0

1

0

1

1

0

1

1

0

0

1

1

0

0

0

1

0

0

1

1

1

0

1

0

 

0

0

1

1

0

0

1

0

0

0

1

1

0

0

0

0

0

0

1

1

0

0

0

0

0

0

1

1

1

0

0

0

 

0

0

1

1

1

0

1

0

0

0

1

1

0

1

0

0

0

1

0

1

1

1

0

1

0

0

1

0

0

0

0

0

O

0

1

0

0

1

1

0

1

0

1

0

0

1

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

1

P

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

1

0

1

1

0

0

0

Q

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

R

0

1

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

0

0

0

0

1

0

1

1

S

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

1

1

1

0

1

1

0

1

0

1

1

0

1

1

T

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

0

1

1

0

1

0

0

1

0

0

U

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

1

0

1

0

0

0

0

1

0

1

1

V

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

W

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

X

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

1

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

Y

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Z

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AA

0

0

0

0

1

0

0

1

0

1

1

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AB

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AC

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

1

0

1

0

0

0

0

0

0

0

0

1

AD

0

0

0

0

0

0

0

1

0

0

0

1

1

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AE

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AF

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

1

0

1

AG

0

1

1

1

1

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AH

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AI

0

0

0

0

1

0

0

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

In the preceding example, the following information appears:

  1. The first two bytes of this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 137 bytes long.
  3. This line indicates a record type value of 36, which represents a correlation policy violation record for Sourcefire 3D System 4.0.
  4. This line indicates that the data that follows is 129 bytes long.
  5. This line contains a value of 33, indicating that a correlation policy violation data block follows.
  6. This line indicates that the length of the policy violation block, including the policy violation block header, is 129 bytes.
  7. The first byte line indicates that the detection engine ID is 0, indicating that the correlation event was generated on the Defense Center. The last three bytes of this line and the first byte of the next line contains the policy event timestamp, 1,098,911,301, which is Wed, 27 Oct 2004 21:08:21 GMT.
  8. The last three bytes of this line and first byte of the next line indicate that the policy event ID number is 10.
  9. The last three bytes of this line and first byte of the next line indicate a policy ID of 4, which, in this case, maps to a custom correlation policy on the Defense Center.
  10. The last three bytes of this line and first byte of the next line indicate rule ID of 29, which, in this case, maps to a custom correlation policy rule on the Defense Center.
  11. The last three bytes of this line and first byte of the next line indicate a policy priority of 1.
  12. The last three bytes of this line and first byte of the next line contain a value of 0, which indicates the beginning of a string block for the policy violation event description.
  13. The last three bytes of this line and first byte of the next line indicate the length of the description. In this example, the length is 21 bytes, including the string block header and the 13 bytes in the event description. In an actual event, the length is typically much longer.
  14. The first byte of this line is a continuation of the string block length, followed by 13 bytes that contain the event description. The event description has been truncated for the sake of this example. In this example, the description is “ [1:2008:4] MI.” In the actual policy violation event that this example is based on, however, the description is much longer: “[ 1:2008:4] MISC CVS invalid user authentication response [Impact: Potentially Vulnerable] From sensor "is.sourcefire.com" at Thu Oct 28 17:07:19 2004 UTC [Classification: Misc Attack] [Priority: 2] {tcp} 10.1.1.24:2401-> 10.1.1.25:34174.”
  15. The third byte in this line has a value of one, which indicates that the type of event that caused the correlation policy violation is an intrusion event. The fourth byte in this line indicates the identification number of the device that generated the intrusion event, in this case, this is sensor 1.
  16. This line indicates that the signature ID for the rule triggered in the event is 2008.
  17. This line indicates that the generator ID for the rule that triggered in the event is 1, the intrusion Detection Engine.
  18. This line indicates that the intrusion event timestamp is 1,098,911,243, which means it was generated at Wed, 27 Oct 2004 21:07:23 GMT.
  19. This line indicates the microsecond the intrusion event was generated, 179,035.
  20. This line indicates that the ID assigned to the intrusion event is 17,828.
  21. This line indicates which of the fields that follow it are valid. Based on how the bits are set, impact flags, IP protocol, source IP, source port, destination IP, and destination port fields will have values.
  22. This line indicates the impact value assigned to the event. Based on how the bits are set, the impact is Orange—Potentially Vulnerable.
  23. The first byte in this line indicates that the IP protocol is 6 (TCP). The second two bytes show the network protocol, which is null. The last byte of this line and first three bytes of the next line begins the source IP string, which is 10.1.1.24.
  24. The first three bytes in this line finish the source IP started in line W and the last byte shows the host type, which is null.
  25. The first two bytes in this line indicate the VLAN ID, which is null. The second two bytes begin a four-byte fingerprint ID, which is also null.
  26. The first two bytes in this line complete the fingerprint ID, the second two bytes contain the source host criticality, which is null.
  27. The first two bytes of this line indicate the source port, 2401. The second two bytes begin the string block for the source host server, which has a value of 0.
  28. The first two bytes end the string block header and the second two bytes begin the string block length. The value of the string block length is 8, indicating that only the header appears and no server description string follows.
  29. The first two bytes complete the string block length. The second two bytes begin the destination IP address, which is 10.1.1.25.
  30. The first two bytes in this line complete the destination IP address. The third byte indicates the destination host type, which is null. The fourth byte begins the two byte destination VLAN ID, which is also null.
  31. The first byte in this line completes the VLAN ID, and the second three bytes begin the four-byte destination fingerprint ID, which is null.
  32. The first byte completes the destination fingerprint ID, the second two bytes contain the destination host criticality (which is null), and the last byte begins the two byte destination port (34174).
  33. The first byte completes the destination port, and the last three bytes begin a four byte string block, which has a value of 0.
  34. The first byte contains the last byte of the string header, and the last three bytes begin a four byte string length. The value here is 8, because no destination server is included in the event.

Example of a Version 4.5 - 4.6.1 Correlation Event

The following diagram shows an example correlation event record in Defense Center 4.5 - 4.6.1format:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

0

0

1

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

1

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

E

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

0

0

F

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

G

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

H

0

1

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

0

1

0

0

0

1

0

1

I

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

J

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

K

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

L

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

M

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

N

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

1

O

0

1

0

1

1

0

1

1

0

0

1

1

0

0

0

1

0

0

1

1

1

0

1

0

0

0

1

1

0

0

1

0

 

0

0

1

1

0

0

0

0

0

0

1

1

0

0

0

0

0

0

1

1

1

0

0

0

0

0

1

1

1

0

1

0

 

0

0

1

1

0

1

0

0

0

1

0

1

1

1

0

1

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

1

P

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

Q

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

1

0

1

1

0

0

0

R

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

S

0

1

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

0

0

0

0

1

0

1

1

T

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

1

1

1

0

1

1

0

1

0

1

1

0

1

1

U

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

0

1

1

0

1

0

0

1

0

0

V

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

1

0

1

0

0

0

0

1

0

1

1

W

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

X

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

Y

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

1

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

Z

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AA

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AB

0

0

0

0

1

0

0

1

0

1

1

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AC

0

0

0

0

1

0

1

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

1

0

0

0

1

1

0

0

1

AD

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AE

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AF

0

0

0

0

0

0

0

0

1

0

0

0

0

1

0

1

0

1

1

1

1

1

1

0

0

0

0

0

0

0

0

0

AG

0

0

0

0

0

0

0

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

In the preceding example, the following information appears:

  1. The first two bytes of this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 153 bytes long.
  3. This line indicates a record type value of 65, which represents a correlation event record for Sourcefire 3D System 4.5.
  4. This line indicates that the data that follows is 145 bytes long.
  5. This line contains a value of 52, indicating that a correlation event data block follows.
  6. This line indicates that the length of the correlation event block, including the correlation event block header, is 145 bytes.
  7. This line indicates that the detection engine ID is 0, indicating that the correlation event was generated on the Defense Center.
  8. This line contains the event timestamp, 1,098,911,301, which is Wed, 27 Oct 2004 21:08:21 GMT.
  9. This line indicates that the event ID number is 10.
  10. This line indicates a policy ID of 4, which, in this case, maps to a custom correlation policy on the Defense Center.
  11. This line indicates a rule ID of 29, which, in this case, maps to a custom correlation policy rule on the Defense Center.
  12. This line indicates a policy priority of 1.
  13. This line contains a value of 0, which indicates the beginning of a string block for the policy violation event description.
  14. This line indicates the length of the description. In this example, the length is 19 bytes, including the string block header and the 11 bytes in the event description. In an actual event, the length is typically much longer.
  15. These three lines contain the 11-byte event description, followed by the event type. The event description has been truncated for the sake of this example. In this example, the description is “ [1:2008:4] .” In the actual policy violation event that this example is based on, however, the description is much longer: “ [1:2008:4] MISC CVS invalid user authentication response [Impact: Potentially Vulnerable] From sensor "is.sourcefire.com" at Thu Oct 28 17:07:19 2004 UTC [Classification: Misc Attack] [Priority: 2] {tcp} 10.1.1.24:2401-> 10.1.1.25:34174.” The fourth byte in the third line has a value of one, which indicates that the type of event that caused the policy violation is an intrusion event.
  16. This line indicates the identification number of the device that generated the intrusion event, in this case, this is sensor 1.
  17. This line indicates that the signature ID for the rule triggered in the event is 2008.
  18. This line indicates that the generator ID for the rule that triggered in the event is 1, the intrusion detection engine.
  19. This line indicates that the intrusion event timestamp is 1,098,911,243, which means it was generated at Wed, 27 Oct 2004 21:07:23 GMT.
  20. This line indicates the microsecond the intrusion event was generated, 179,035.
  21. This line indicates that the ID assigned to the intrusion event is 17,828.
  22. This line indicates which of the fields that follow it are valid. Based on how the bits are set, impact flags, IP protocol, source IP, source port, destination IP, and destination port fields will have values.
  23. This line indicates the impact value assigned to the event. Based on how the bits are set, the impact is Orange—Potentially Vulnerable.
  24. The first byte in this line indicates that the IP protocol is 6 (TCP). The second two bytes show the network protocol, which is null. The last byte of this line and first three bytes of the next line begins the source IP string, which is 10.1.1.24.
  25. The first three bytes in this line finish the source IP started in line W and the last byte shows the host type, which is null.
  26. The first two bytes in this line indicate the VLAN ID, which is null. The second two bytes and the next three lines contain the first 14 bytes of a 16-byte fingerprint UUID, which is also null.
  27. The first two bytes in this line complete the fingerprint UUID, the second two bytes contain the source host criticality, which is null.
  28. The first two bytes of this line indicate the source port, 2401. The second two bytes indicate the server ID for the source host server, which has a value of 0.
  29. This line contains the destination IP address, which is 10.1.1.25.
  30. The first byte in this line indicates the destination host type, which is null. The second and third bytes indicate the two byte destination VLAN ID, which is also null. The fourth byte and the next three lines contain the first 13 bytes of a 16-byte fingerprint UUID, which is also null.
  31. The first three bytes in this line complete the 16-byte destination fingerprint ID, which is null. The fourth byte begins the destination host criticality (which is null).
  32. The first byte in this line completes the destination host criticality (which is null). The next two bytes contain the two byte destination port (34174). The last byte begins the destination server ID, which is null.
  33. The first byte in this line completes the destination server ID, which is null.

Example of a Version 4.10 Correlation Event

The following diagram shows an example correlation event record in Defense Center 4.10 format:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

0

0

1

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

0

0

0

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

E

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

0

0

F

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

G

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

H

0

1

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

0

1

0

0

0

1

0

1

I

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

J

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

K

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

L

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

M

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

N

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

1

O

0

1

0

1

1

0

1

1

0

0

1

1

0

0

0

1

0

0

1

1

1

0

1

0

0

0

1

1

0

0

1

0

 

0

0

1

1

0

0

0

0

0

0

1

1

0

0

0

0

0

0

1

1

1

0

0

0

0

0

1

1

1

0

1

0

 

0

0

1

1

0

1

0

0

0

1

0

1

1

1

0

1

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

1

P

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

Q

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

1

0

1

1

0

0

0

R

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

S

0

1

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

0

0

0

0

1

0

1

1

T

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

1

1

1

0

1

1

0

1

0

1

1

0

1

1

U

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

0

1

1

0

1

0

0

1

0

0

V

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

1

0

1

0

0

0

0

1

0

1

1

W

0

0

0

0

0

1

1

1

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

X

0

0

0

0

1

0

1

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

1

0

0

0

1

1

0

0

0

Y

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Z

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AA

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

AB

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

0

1

1

0

0

0

0

1

0

0

0

0

0

0

0

0

AC

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

AD

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

1

0

0

0

1

1

0

0

1

0

0

0

0

0

0

0

0

AE

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AF

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AG

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

AH

1

0

0

0

0

1

0

1

0

1

1

1

1

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AI

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

 

 

 

 

 

 

 

In the preceding example, the following information appears:

  1. The first two bytes of this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 153 bytes long.
  3. This line indicates a record type value of 112, which represents a correlation event record for Sourcefire 3D System 4.10.
  4. This line indicates that the data that follows is 145 bytes long.

Note that bit 23 was not set in the request, so Timestamp data is not included in the example.

  1. This line contains a value of 107, indicating that a correlation event data block follows.
  2. This line indicates that the length of the correlation event block, including the correlation event block header, is 145 bytes.
  3. This line indicates that the detection engine ID is 0, indicating that the correlation event was generated on the Defense Center.
  4. This line contains the correlation event timestamp, 1,098,911,301, which is Wed, 27 Oct 2004 21:08:21 GMT.
  5. This line indicates that the correlation event ID number is 10.
  6. This line indicates a policy ID of 4, which, in this case, maps to a custom correlation policy on the Defense Center.
  7. This line indicates a rule ID of 29, which, in this case, maps to a custom correlation policy rule on the Defense Center.
  8. This line indicates a policy priority of 1.
  9. This line contains a value of 0, which indicates the beginning of a string block for the event description.
  10. This line indicates the length of the description. In this example, the length is 19 bytes, including the string block header and the 11 bytes in the event description. In an actual event, the length is typically much longer.
  11. These three lines contain the 11-byte event description, followed by the event type. The event description has been truncated for the sake of this example. In this example, the description is “ [1:2008:4] .” In the actual policy violation event that this example is based on, however, the description is much longer: “[ 1:2008:4] MISC CVS invalid user authentication response [Impact: Potentially Vulnerable] From sensor "is.sourcefire.com" at Thu Oct 28 17:07:19 2004 UTC [Classification: Misc Attack] [Priority: 2] {tcp} 10.1.1.24:2401-> 10.1.1.25:34174.” The fourth byte in the third line has a value of one, which indicates that the type of event that caused the policy violation is an intrusion event.
  12. This line indicates the identification number of the detection engine that generated the intrusion event, in this case, this is detection engine 1.
  13. This line indicates that the signature ID for the rule triggered in the event is 2008.
  14. This line indicates that the generator ID for the rule that triggered in the event is 1, the intrusion detection engine.
  15. This line indicates that the intrusion event timestamp is 1,098,911,243, which means it was generated at Wed, 27 Oct 2004 21:07:23 GMT.
  16. This line indicates the microsecond the intrusion event was generated, 179,035.
  17. This line indicates that the ID assigned to the intrusion event is 17,828.
  18. This line indicates which of the fields that follow it are valid. Based on how the bits are set, impact flags, IP protocol, source IP, source port, destination IP, and destination port fields will have values.
  19. The first byte in this line indicates the impact value assigned to the event. Based on how the bits are set, the impact is Orange—Potentially Vulnerable. The second byte in this line indicates that the IP protocol is 6 (TCP). The last two bytes show the network protocol, which is null.
  20. The line indicates the source IP string, which is 10.1.1.24.
  21. The first byte in this line indicates the host type, which is null. The second and third bytes in this line indicate the VLAN ID, which is null. The last byte and the next three lines contain the first 13 bytes of a 16-byte fingerprint UUID, which is also null.
  22. The first three bytes in this line complete the fingerprint UUID. The last byte begins the source host criticality, which is null.
  23. The first byte of this line completes the source host criticality. The last three bytes begin the source user ID, which has a value of 9.
  24. The first byte of this line completes the source user ID. The second and third bytes indicate the source port, 2401. The last byte begins the server ID for the source host server, which has a value of 0.
  25. This line completes the server ID. The last byte in this line begins the destination IP address, which is 10.1.1.25.
  26. The first three bytes in this line complete the destination IP address. The last byte indicates the destination host type, which is null.
  27. The first two bytes in this line indicate the two byte destination VLAN ID, which is also null. The third and fourth byte and the next three lines contain the first 14 bytes of a 16-byte fingerprint UUID, which is also null.
  28. The first two bytes in this line complete the 16-byte destination fingerprint ID, which is null. The third and fourth byte indicates the destination host criticality (which is null).
  29. This line indicates the destination user ID, which has a value of 20.
  30. The first two bytes of this line contain the two byte destination port (34174). The last two bytes contain the destination server ID, which is null.
  31. The first two bytes in this line indicate the destination server ID, which is null. The third byte indicates whether the packet was blocked.

Example of a Version 5.1+ User Event

The following diagram shows an example user event record in Defense Center 5.1+ format:

 

Byte

0

1

2

3

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

A

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

B

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

1

0

0

1

C

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

1

1

1

D

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

1

0

0

1

E

0

1

0

1

0

0

1

0

1

1

1

0

1

1

1

1

1

1

1

1

0

0

0

1

0

1

1

1

0

1

0

1

F

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

G

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

H

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

I

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

J

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

K

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

1

0

1

1

1

0

1

1

1

1

L

1

1

1

1

0

0

0

1

0

1

1

1

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

M

1

1

0

0

0

1

1

0

0

1

0

0

1

1

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

N

0

0

0

0

0

0

1

1

1

1

1

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

O

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

1

1

1

0

0

1

1

1

1

1

1

0

0

0

1

P

1

1

1

0

1

1

1

1

0

1

0

1

0

0

1

0

0

0

0

1

0

0

0

1

0

0

0

0

0

0

1

0

Q

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

R

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

0

0

0

0

1

0

1

0

0

0

0

0

0

1

0

0

S

0

0

0

0

1

1

1

1

0

1

1

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

T

0

0

0

0

0

0

0

0

0

1

1

1

1

1

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

U

0

0

0

0

0

0

0

0

0

1

0

1

0

0

0

1

0

1

0

1

0

0

1

0

1

1

1

0

1

1

1

1

V

1

1

1

1

0

0

0

1

0

1

1

1

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

W

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

X

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Y

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

1

0

0

1

1

0

0

1

1

0

0

0

0

 

0

0

1

1

0

0

0

1

0

1

0

0

0

0

0

0

0

0

1

1

0

0

0

1

0

0

1

1

0

0

0

0

 

0

0

1

0

1

1

1

0

0

0

1

1

0

1

0

0

0

0

1

0

1

1

1

0

0

0

1

1

0

0

0

1

 

0

0

1

1

0

0

0

1

0

0

1

0

1

1

1

0

0

0

1

1

0

0

0

1

0

0

1

1

0

1

1

1

Z

0

0

1

1

0

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

AA

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

AB

1

0

1

0

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

1

1

1

1

 

1

1

1

1

1

1

1

1

0

0

0

0

1

0

1

0

0

0

0

0

0

1

0

0

0

0

0

0

1

1

1

1

AC

0

1

1

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

 

 

 

 

 

 

 

In the preceding example, the following information appears:

  1. The first two bytes of this line indicate the standard header value of 1. The second two bytes indicate that the message is a data message (message type four).
  2. This line indicates that the message that follows is 153 bytes long.
  3. This line indicates a record type value of 95, which represents a user information update message block.
  4. This line indicates that the data that follows is 137 bytes long.
  5. This line contains the archive timestamp. It is included since bit 23 was set. The timestamp is a Unix timestamp, stored as seconds since 1/1/1970. This time stamp is 1,391,789,354, which is Mon Feb  3 19:43:49 2014.
  6. This line contains zeros and is reserved for future use.
  7. This line indicates that the length of the correlation event block, including the correlation event block header, is 145 bytes.
  8. This line indicates that the detection engine ID is 0, indicating that the correlation event was generated on the Defense Center.
  9. This line contains the correlation event timestamp, 1,098,911,301, which is Wed, 27 Oct 2004 21:08:21 GMT.
  10. This line indicates that the correlation event ID number is 10.
  11. This line indicates a policy ID of 4, which, in this case, maps to a custom correlation policy on the Defense Center.
  12. This line indicates a rule ID of 29, which, in this case, maps to a custom correlation policy rule on the Defense Center.
  13. This line indicates a policy priority of 1.
  14. This line contains a value of 0, which indicates the beginning of a string block for the event description.
  15. This line indicates the length of the description. In this example, the length is 19 bytes, including the string block header and the 11 bytes in the event description. In an actual event, the length is typically much longer.
  16. These three lines contain the 11-byte event description, followed by the event type. The event description has been truncated for the sake of this example. In this example, the description is “ [1:2008:4] .” In the actual policy violation event that this example is based on, however, the description is much longer: “[ 1:2008:4] MISC CVS invalid user authentication response [Impact: Potentially Vulnerable] From sensor "is.sourcefire.com" at Thu Oct 28 17:07:19 2004 UTC [Classification: Misc Attack] [Priority: 2] {tcp} 10.1.1.24:2401-> 10.1.1.25:34174.” The fourth byte in the third line has a value of one, which indicates that the type of event that caused the policy violation is an intrusion event.
  17. This line indicates the identification number of the detection engine that generated the intrusion event, in this case, this is detection engine 1.
  18. This line indicates that the signature ID for the rule triggered in the event is 2008.
  19. This line indicates that the generator ID for the rule that triggered in the event is 1, the intrusion detection engine.
  20. This line indicates that the intrusion event timestamp is 1,098,911,243, which means it was generated at Wed, 27 Oct 2004 21:07:23 GMT.
  21. This line indicates the microsecond the intrusion event was generated, 179,035.
  22. This line indicates that the ID assigned to the intrusion event is 17,828.
  23. This line indicates which of the fields that follow it are valid. Based on how the bits are set, impact flags, IP protocol, source IP, source port, destination IP, and destination port fields will have values.
  24. The first byte in this line indicates the impact value assigned to the event. Based on how the bits are set, the impact is Orange—Potentially Vulnerable. The second byte in this line indicates that the IP protocol is 6 (TCP). The last two bytes show the network protocol, which is null.
  25. The line indicates the source IP string, which is 10.1.1.24.
  26. The first byte in this line indicates the host type, which is null. The second and third bytes in this line indicate the VLAN ID, which is null. The last byte and the next three lines contain the first 13 bytes of a 16-byte fingerprint UUID, which is also null.
  27. The first three bytes in this line complete the fingerprint UUID. The last byte begins the source host criticality, which is null.
  28. The first byte of this line completes the source host criticality. The last three bytes begin the source user ID, which has a value of 9.
  29. The first byte of this line completes the source user ID. The second and third bytes indicate the source port, 2401. The last byte begins the server ID for the source host server, which has a value of 0.
  30. This line completes the server ID. The last byte in this line begins the destination IP address, which is 10.1.1.25.
  31. The first three bytes in this line complete the destination IP address. The last byte indicates the destination host type, which is null.
  32. The first two bytes in this line indicate the two byte destination VLAN ID, which is also null. The third and fourth byte and the next three lines contain the first 14 bytes of a 16-byte fingerprint UUID, which is also null.
  33. The first two bytes in this line complete the 16-byte destination fingerprint ID, which is null. The third and fourth byte indicates the destination host criticality (which is null).

Discovery Data Structure Examples

This section contains examples of data structures that may be transmitted by eStreamer for discovery events. The following examples are provided:

Example of a New Network Protocol Message

HREF="/c/en/us/td/docs/security/firesight/5311/api/estreamer/EventStreamerIntegrationGuide/AppAExamples.html#92055">Example of a New TCP Server Message

Example of a New Network Protocol Message

The following diagram illustrates a sample new network protocol message for 3.0+:

Byte

0

1

2

3

 

 

 

 

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

 

 

 

 

Header Version 1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

Event Msg (4)

Standard Message Header

 

Message Length (49B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

0

0

1

 

 

 

New NW Protocol Msg (13)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

 

 

 

Msg Length 41B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

0

1

0

0

0

 

 

 

Detection Engine ID (2)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

 

 

 

IP (192.168.1.10)

1

1

0

0

0

0

0

0

1

0

1

0

1

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

1

0

1

0

 

 

 

MAC Address (none)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

 

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Reserved Bytes (0)

Unix Sec (1047242787)

0

0

1

1

1

1

1

0

0

1

1

0

1

0

1

1

1

0

1

0

1

0

0

0

0

0

1

0

0

0

1

1

 

Unix MSec (973208)

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

1

0

1

1

0

0

1

1

0

0

1

1

0

0

0

 

Reserved Bytes (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

1

0

1

0

0

0

Event Type 1000—New

EventSub 4-New Trans Prot

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

 

 

 

File Number

0

1

0

0

0

0

0

0

0

1

0

0

0

1

1

1

1

0

0

0

1

0

0

1

1

1

0

1

0

0

0

1

 

 

 

File Position

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

0

0

0

0

0

 

 

 

Protocol (6—TCP)

0

0

0

0

0

1

1

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Example of a New TCP Server Message

The following diagram illustrates a sample new TCP server message for 3.0:

 

Byte

0

1

2

3

 

 

 

 

Bit

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

 

 

 

 

Header Version 1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

Event Msg (4)

Standard Message Header

 

Message Length (256B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

 

 

 

New TCP Svc Msg (11)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

 

 

 

Msg Length (248B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

1

0

0

0

 

 

 

Detection Engine ID (2)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

 

 

 

IP (192.168.1.10)

1

1

0

0

0

0

0

0

1

0

1

0

1

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

1

0

1

0

 

 

 

MAC Address (none)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

 

 

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Reserved Bytes (0)

Unix Sec (1047242787)

0

0

1

1

1

1

1

0

0

1

1

0

1

0

1

1

1

0

1

0

1

0

0

0

0

0

1

0

0

0

1

1

 

Unix MSec (973208)

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

1

1

0

1

1

0

0

1

1

0

0

1

1

0

0

0

 

Reserved Bytes (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

1

0

1

0

0

0

Event Type 1000—New

Event Subtype 2 -New Host

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

 

 

 

File Number

0

1

0

0

0

0

0

0

0

1

0

0

0

1

1

1

1

0

0

0

1

0

0

1

1

1

0

1

0

0

0

1

 

 

 

File Position

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

0

0

0

0

0

 

 

 

Server Block Header (12)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

0

Start Server Data Block

Server Length (208B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

0

0

0

0

 

 

 

 

Server Port (80)

0

0

0

0

0

0

0

0

0

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Hits

 

Hits (1)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Header

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Length

 

String Block Length (13B)

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

0

1

1

0

1

0

0

0

0

1

1

1

0

1

0

0

 

 

Server Name ( https)

0

1

1

1

0

1

0

0

0

1

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Header

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Length

 

String Block Length (15B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

1

0

1

0

0

0

0

0

1

 

 

Server Vendor ( Apache + null byte)

0

1

1

1

0

0

0

0

0

1

1

0

0

0

0

1

0

1

1

0

0

0

1

1

0

1

1

0

1

0

0

0

 

 

 

 

0

1

1

0

0

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Header

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Length

 

String Length (8-no product)

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Header

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Length

 

String Block Length (22B)

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

0

0

0

1

1

0

0

0

1

0

0

1

0

1

1

1

0

 

 

 

 

 

Version - 1.3.26 (Unix)

 

0

0

1

1

0

0

1

1

0

0

1

0

1

1

1

0

0

0

1

1

0

0

1

0

0

0

1

1

0

1

1

0

 

 

 

 

0

0

1

0

0

0

0

0

0

0

1

0

1

0

0

0

0

1

0

1

0

1

0

1

0

1

1

0

1

1

1

0

 

 

 

 

0

1

1

0

1

0

0

1

0

1

1

1

1

0

0

0

0

0

1

0

1

0

0

1

0

0

0

0

0

0

0

0

 

 

 

 

List Block Header (11)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

0

1

Start Sub-server List

List Block Size (94B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

1

1

0

 

 

 

 

Sub-server Hdr (1)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

Start Sub-server Block

Sub-server Len (46B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

1

0

 

 

 

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

 

 

 

String Length (16B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

 

 

 

 

Sub-server Name - mod_ssl

0

1

1

0

1

1

0

1

0

1

1

0

1

1

1

1

0

1

1

0

0

1

0

0

0

1

0

1

1

1

1

1

 

 

 

 

0

1

1

1

0

0

1

1

0

1

1

1

0

0

1

1

0

1

1

0

1

1

0

0

0

0

0

0

0

0

0

0

 

 

 

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

 

 

 

String Block Len (8B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

(No subtype vendor)

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

 

 

 

 

String Block Length (14B)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

1

1

0

 

 

 

 

Sub-server Version - 2.8.9 + null character

0

0

1

1

0

0

1

0

0

0

1

0

1

1

1

0

0

0

1

1

1

0

0

0

0

0

1

0

1

1

1

0

End Sub-server Block

0

0

1

1

1

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Start Sub-server Block

Sub-server Hdr (1)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Sub-server Length

 

Sub-server Length (48B)

0

0

0

0

0

0

0

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Header

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Size

 

String Block Size (16B)

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

1

0

0

1

1

1

1

0

1

1

1

0

0

0

0

 

 

 

 

Sub-server Name - OpenSSL

0

1

1

0

0

1

0

1

0

1

1

0

1

1

1

0

0

1

0

1

0

0

1

1

0

1

0

1

0

0

1

1

 

 

 

 

0

1

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Header

 

String Block Header (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Data Length

 

String Length (8-no vendor)

0

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Header

 

String Block Hdr (0)

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

String Block Length

 

String Block Len (16B)

0

0

0

0

0

0

0

0

0

0

0

1

0

0

0

0

0

0

1

1

0

0

0

0

0

0

1

0

1

1

1

0

 

 

 

 

Sub-server Version - 0.9.6.d + null byte

0

0

1

1

1

0

0

1

0

0

1

0

1

1

1

0

0

0

1

1

0

1

1

0

0

0

1

0

1

1

1

0

End Sub-server Block

0

1

1

0

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Confidence %

 

Confidence % (100)

0

0

0

0

0

0

0

0

0

1

1

0

0

1

0

0

0

0

1

1

1

1

1

0

0

1

1

0

1

0

1

1

Last used

 

Last Used (1047242787)

1

0

1

0

1

0

0

0

0

0

1

0

0

0

1

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Blob Data Block

 

Blob Data Block (10)

0

0

0

0

0

0

0

0

0

0

0

0

1

0

1

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

Blob Data Length

 

Blob Data Length (22B)

0

0

0

0

0

0

0

0

0

0

0

1

0

1

1

0

0

1

0

0

1

0

0

0

0

1

0

1

0

1

0

0

 

 

 

 

 

 

 

Server Banner (HTTP/1.1 414 Reque) -Server banner shortened for example, typically 256B.

0

1

0

1

0

1

0

0

0

1

0

1

0

0

0

0

0

0

1

0

1

1

1

1

0

0

1

1

0

0

0

1

 

 

 

 

0

0

1

0

1

1

1

0

0

0

1

1

0

0

0

1

0

0

1

0

0

0

0

0

0

0

1

1

0

1

0

0

 

 

 

 

0

0

1

1

0

0

0

1

0

0

1

1

0

1

0

0

0

0

1

0

0

0

0

0

0

1

0

1

0

0

1

0

 

 

 

 

0

1

1

0

0

1

0

1

0

1

1

1

0

0

0

1

0

1

1

1

0

1

0

1

0

1

1

0

0

1

0

1

End Server Data Block