Fireeye

LogZilla App Store application: Fireeye

Overview

FireEye (now Trellix) provides advanced threat protection across network, email, and endpoint security:

  • MPS - Malware Protection System for network malware detection
  • NX - Network Security for network threat detection
  • EX - Email Security for email threat detection
  • HX - Endpoint Security for endpoint detection and response

App Function

  • Parse Common Event Format (CEF) logs from all FireEye product types
  • Extract security event metadata for filtering and analysis
  • Detect command and control (C&C) callback activity
  • Identify CVE exploits and attack modes
  • Verify threats via MVX sandbox confirmation
  • Provide analyst-focused dashboards for security monitoring
  • Alert on C&C activity, CVE exploits, and MVX-confirmed threats

Vendor Documentation

LogZilla Configuration

FireEye requires a dedicated syslog port in LogZilla:

  1. Navigate to Settings > System > Application Ports
  2. Set FireEye syslog port to a dedicated port (e.g., 5516)
  3. Click Save

The syslog and parser services will reload automatically. Both TCP and UDP listeners are enabled on the configured port.

Device Configuration

Configure FireEye appliances to send syslog to LogZilla:

  1. Log into the FireEye appliance management console
  2. Navigate to Settings > Notifications > Syslog
  3. Add a new syslog server with the LogZilla server IP address
  4. Set the port to the dedicated FireEye port configured above (e.g., 5516)
  5. Enable CEF format for log output
  6. Save the configuration

Verification

Generate a test alert or wait for normal traffic, then verify events appear in LogZilla with Vendor tag set to FireEye and Product tag set to MPS, NX, EX, or HX depending on the appliance type.

Incoming Log Format

FireEye logs follow the Common Event Format (CEF) standard:

text
<timestamp> <sensor> fenotify-<n>.<level>: CEF:0|FireEye|<product>|<version>|
<sig_id>|<sig_name>|<severity>|<key=value pairs>
  • timestamp - Syslog timestamp
  • sensor - FireEye sensor name
  • level - Log level (alert, warning, info)
  • product - FireEye product (MPS, NX, EX, HX, CMS)
  • sig_id - Signature identifier
  • sig_name - Signature name
  • severity - CEF severity (1-10)

Parsed Metadata Fields

Global Tags

Tag NameExampleDescription
VendorFireEyeVendor name
ProductMPSProduct name
Event ClasssecurityCross-vendor event classification
MitreIdT1071MITRE ATT&CK technique ID
MITRE TacticCommand and ControlMITRE ATT&CK tactic

FireEye Tags

Tag NameExampleDescription
Signature NameMalware.GenericSignature name describing the threat
SrcIP192.168.1.100Source IP address
DstIP10.0.0.1Destination IP address
DstPortHTTPSDestination port with service name
ProtocolTCPNetwork protocol
CNC Hostmalware.example.comCommand and control host
CNC Port8080Command and control port
Source Hostworkstation-01Affected endpoint hostname
Source Userjohn.doeSource username
Dest UseradminDestination username
ActionblockedAction taken on the threat
Attack ModecallbackAttack classification mode
CVE IDCVE-2021-44228CVE identifier for vulnerability correlation
MVXtrueMulti-Vector Virtual Execution sandbox result

Log Examples

Basic Alert

text
Feb  2 14:14:12 MPS001 fenotify-1.warning: CEF:0|FireEye|MPS|1.2.3|sig1|
signature1|1|rt=Feb  2 2023 14:14:12 UTC dst=1.2.3.4 src=5.6.7.8

C&C Detection

text
Feb  2 14:14:12 MPS001 fenotify-1.alert: CEF:0|FireEye|MPS|1.2.3|callback|
Malware.Callback|8|dst=10.0.0.1 src=192.168.1.100 cs5Label=cncHost
cs5=malware.example.com cn3Label=cncPort cn3=8080

MITRE ATT&CK Mapping

Event TypeTechniqueTactic
C&C DetectionT1071Command and Control
CVE ExploitT1203Execution
Malware DetectionT1204Execution

C&C callback activity receives T1071 (Application Layer Protocol). CVE exploits receive T1203 (Exploitation for Client Execution). All other malware detections receive T1204 (User Execution) as the default.

Dashboards

DashboardDescription
FireEye: Security OverviewAlerts, C&C, CVE, blocked, attackers, MITRE tactics

Triggers

TriggerDescription
FireEye: MITRE ATT&CK Threat DetectedEvents with MITRE technique mapping
FireEye: Command and Control ActivityC&C host detection
FireEye: CVE Exploit DetectedKnown vulnerability exploitation
FireEye: Threat BlockedFireEye blocked a threat
FireEye: MVX Confirmed ThreatSandbox verified threat
Fireeye | LogZilla Documentation