Parsers and Generated Fields

Tag Fields Created by Parser nozomi-ids
  • #Cps.version

  • #Vendor

  • #ecs.version

  • #event.dataset

  • #event.kind

  • #event.module

  • #event.outcome

  • #observer.type

Fields Identified by Parser nozomi-ids
Vendor FieldCPS FieldDescription
Vendor.msgVariousMessage content parsed for various fields based on pattern matching
Vendor.msgclient.ipClient IP address extracted from message
Vendor.dhostdestination.addressDestination hostname
Vendor.dstdestination.ipDestination IP address
Vendor.dmacdestination.macDestination MAC address, converted to uppercase with hyphens
Vendor.dptdestination.portDestination port number
Vendor.device.vendordevice.manufacturerDevice manufacturer information
Vendor.Nameevent.actionEvent action name
Vendor.msgevent.category[]Event categories determined by message content
Vendor.Idevent.idUnique event identifier
Vendor.msgevent.outcomeEvent outcome determined by message content
Vendor.event_class_idevent.reasonEvent classification ID
Vendor.Riskevent.risk_scoreRisk score associated with the event
Vendor.severityevent.severityEvent severity level, mapped to numeric values based on severity range
Vendor.startevent.startEvent start timestamp
Vendor.msgevent.type[]Event types determined by message content
Vendor.msgfile.hash.md5MD5 hash extracted from message, converted to lowercase
Vendor.msgfile.nameFilename extracted from message
Vendor.msgfile.pathFile path extracted from message
Vendor.applog.syslog.appnameApplication name from CEF header
Vendor.msgnetwork.protocolNetwork protocol extracted from message
Vendor.protonetwork.transportNetwork transport protocol
Vendor.dvchostobserver.hostnameObserver hostname, converted to lowercase
Vendor.dvcobserver.ip[0]Device IP address added to observer IP array
Vendor.device.productobserver.os.nameOperating system name of the observer
Vendor.device.versionobserver.os.versionOperating system version of the observer
Vendor.device.vendorobserver.vendorObserver vendor name
Vendor.n2os_schemaobserver.versionObserver schema version
Vendor.msgprocess.nameProcess name extracted from message
Vendor.trigger_typerule.categoryType of trigger that generated the event
Vendor.trigger_idrule.idTrigger ID for the event
Vendor.event_class_idrule.nameRule name set when event.kind is "alert"
Vendor.event_class_id;rule.name 
Vendor.msgserver.addressServer address extracted from message, converted to lowercase
Vendor.msgserver.ipServer IP address extracted from message
Vendor.shostsource.addressSource hostname
Vendor.srcsource.ipSource IP address
Vendor.smacsource.macSource MAC address, converted to uppercase with hyphens
Vendor.dptsource.portSource port number
Vendor.msgthreat.software.nameThreat software name extracted from message
Vendor.Mitre_attack_techniquesthreat.tactic.id[] MITRE ATT&CK technique IDs added to array
Vendor.Mitre_attack_tacticsthreat.tactic.name[] MITRE ATT&CK tactic names added to array
Vendor.msgthreat.technique.nameThreat technique name extracted from message
Vendor.msgurl.domainURL domain extracted from message, converted to lowercase
Vendor.msgurl.originalOriginal URL extracted from message
@rawstringuser.domainDomain name extracted from suser field when in domain\username format
Vendor.suseruser.nameUsername extracted from suser field
Vendor.suser;user.name