The following is an example of Enhanced Syslog format:

16/06/16 14:38:37
Notice message from 123.45.67.8
Hostname: desktop8.mycorp.local
1 2016-06-16T14:38:37Z laptop6 - - - - Carbon Black App Control event:  
text="Computer WORKGROUP\LAPTOP6 discovered new file 
'c:\windows\temp\jvyyqbe4.dll' [eeb0ada676b1f8e5e94015b5e48ed4bcf23959b0d0837bbd51c1870f5d641d2a]." 
type="Discovery" subtype="New unapproved file to computer" 
hostname="WORKGROUP\LAPTOP6" username="NT AUTHORITY\SYSTEM" date="6/16/2016 2:38:35 PM" 
ip_address="fd70::a98b:d49b:e45f:cd30" 
process="c:\windows\microsoft.net\framework64\v2.0.50727\csc.exe" 
file_path="c:\windows\temp\jvyyqbe4.dll" file_name="jvyyqbe4.dll" 
file_hash="eeb0ada676b1f8e5e94015b5e48ed4bcf23959b0d0837bbd51c1870f5d641d2a" 
installer_name="csc.exe" policy="Test" process_key="00000000-0000-0bc4-01cf-8970a7aca018" 
server_version="8.1.0.992" file_trust="-1" file_threat="-1" 
prevalence="-1" global_state="approved"