Parsers and Generated Fields

Tag Fields Created by Parser nozomi-ids
  • #Cps.version

  • #Vendor

  • #ecs.version

  • #event.dataset

  • #event.kind

  • #event.module

  • #event.outcome

  • #observer.type

Fields Identified by Parser nozomi-ids
Source FieldCPS FieldDescriptionMapping
Vendor.syslog.timestamp@timestampEvent timestampParsed from syslog timestamp using parseTimestamp()
Vendor.msgclient.ipClient IP addressExtracted from message content
Vendor.dhostdestination.addressDestination hostname or addressCopied from Vendor.dhost, converted to lowercase
Vendor.dstdestination.ipDestination IP addressCopied from Vendor.dst
Vendor.dmacdestination.macDestination MAC addressTransformed from Vendor.dmac (uppercase, hyphen delimiters)
Vendor.dptdestination.portDestination port numberCopied from Vendor.dpt
Vendor.device.vendordevice.manufacturerDevice manufacturerCopied from Vendor.device.vendor
Noneecs.versionECS schema versionStatic value: 9.1.0
Vendor.Nameevent.actionAction performed in the eventCopied from Vendor.Name
Vendor.msgevent.category[]Event categories determined by message analysisArray populated based on message content patterns
Noneevent.datasetEvent dataset identifierStatic value: ids.iot
Vendor.Idevent.idUnique event identifierCopied from Vendor.Id
Noneevent.kindEvent kind classificationStatic value: event
Noneevent.moduleEvent module identifierStatic value: ids
Vendor.msgevent.outcomeEvent outcome (success/failure/unknown)Set based on message content patterns
Vendor.event_class_idevent.reasonEvent classification reasonCopied from Vendor.event_class_id
Vendor.Riskevent.risk_scoreRisk score associated with the eventCopied from Vendor.Risk
Vendor.severityevent.severityEvent severity levelMapped from Vendor.severity using severity ranges
Vendor.startevent.startEvent start timestampCopied from Vendor.start
Vendor.msgevent.type[]Event types determined by message analysisArray populated based on message content patterns
Vendor.msgfile.hash.md5MD5 hash of fileExtracted from message content, converted to lowercase
Vendor.msgfile.nameFilenameExtracted from message content
Vendor.msgfile.pathFile pathExtracted from message content
Vendor.applog.syslog.appnameSyslog application nameCopied from Vendor.app
@rawstringlog.syslog.hostnameSyslog hostnameExtracted from syslog header
@rawstringlog.syslog.prioritySyslog priority valueExtracted from syslog header
@rawstringlog.syslog.versionSyslog versionExtracted from RFC 5424 syslog header
Vendor.msgnetwork.protocolNetwork protocol extracted from messageExtracted from message content
Vendor.protonetwork.transportNetwork transport protocolCopied from Vendor.proto
Vendor.dvchostobserver.hostnameObserver hostnameCopied from Vendor.dvchost
Vendor.dvcobserver.ip[]Observer IP addressesArray with Vendor.dvc value appended
Vendor.device.productobserver.os.nameObserver operating system nameCopied from Vendor.device.product
Vendor.device.versionobserver.os.versionObserver operating system versionCopied from Vendor.device.version
Vendor.device.vendorobserver.vendorObserver vendor nameCopied from Vendor.device.vendor
Vendor.n2os_schemaobserver.versionObserver schema versionCopied from Vendor.n2os_schema
Vendor.msgprocess.nameProcess nameExtracted from message content
Vendor.trigger_typerule.categoryRule categoryCopied from Vendor.trigger_type
Vendor.trigger_idrule.idRule identifierCopied from Vendor.trigger_id
Vendor.event_class_idrule.nameRule name for alert eventsCopied from Vendor.event_class_id when event.kind is alert
Vendor.msgserver.addressServer addressExtracted from message content, converted to lowercase
Vendor.msgserver.ipServer IP addressExtracted from message content
Vendor.shostsource.addressSource hostname or addressCopied from Vendor.shost
Vendor.srcsource.ipSource IP addressCopied from Vendor.src
Vendor.smacsource.macSource MAC addressTransformed from Vendor.smac (uppercase, hyphen delimiters)
Vendor.dptsource.portSource port numberCopied from Vendor.dpt
Vendor.msgthreat.software.nameThreat software nameExtracted from message content
Vendor.Mitre_attack_techniquesthreat.tactic.id[]MITRE ATT&CK technique IDsArray with Vendor.Mitre_attack_techniques appended
Vendor.Mitre_attack_tacticsthreat.tactic.name[]MITRE ATT&CK tactic namesArray with Vendor.Mitre_attack_tactics appended
Vendor.msgthreat.technique.nameThreat technique nameExtracted from message content
Vendor.msgurl.domainURL domainExtracted from message content, converted to lowercase
Vendor.msgurl.originalOriginal URLExtracted from message content
Vendor.suser, @rawstringuser.domainUser domainExtracted from domain\username format in suser field
Vendor.suser, @rawstringuser.nameUsernameExtracted from Vendor.suser or parsed from domain\username format