Parsers and Generated Fields

Tag Fields Created by Parser zscaler-deception
  • #Cps.version

  • #Vendor

  • #ecs.version

  • #event.dataset

  • #event.kind

  • #event.module

  • #event.outcome

  • #observer.type

Fields Identified by Parser zscaler-deception
Source FieldCPS FieldDescriptionMapping
Vendor.timestamp@timestampEvent timestampParsed from Vendor.timestamp using parseTimestamp()
Vendor.landmine.versionagent.versionAgent versionCopied from Vendor.landmine.version
source.addressclient.addressClient addressCopied from source.address
source.bytesclient.bytesClient bytes sentCopied from source.bytes
source.domainclient.domainClient domainCopied from source.domain
source.ipclient.ipClient IP addressCopied from source.ip
source.packetsclient.packetsClient packets sentCopied from source.packets
source.portclient.portClient portCopied from source.port
Vendor.azure.resourceIdcloud.instance.idAzure resource identifierCopied from Vendor.azure.resourceId
Vendor.azure.operationNamecloud.service.nameAzure operation nameCopied from Vendor.azure.operationName
Vendor.linux.container_namecontainer.nameContainer nameCopied from Vendor.linux.container_name
destination.ip, destination.domaindestination.addressDestination addressCoalesced from destination.ip and destination.domain
Vendor.network.resp_ip_bytesdestination.bytesDestination bytes sentCopied from Vendor.network.resp_ip_bytes
Vendor.decoy.name, Vendor.recon.server_namedestination.domainDestination domainCoalesced and lowercased from decoy and server name fields
Vendor.decoy.ipdestination.ipDestination IP addressCopied from Vendor.decoy.ip after IP validation
Vendor.network.resp_pktsdestination.packetsDestination packets sentCopied from Vendor.network.resp_pkts
Vendor.decoy.portdestination.portDestination portCopied from Vendor.decoy.port
Noneecs.versionECS schema versionStatic value: 9.2.0
Vendor.module, Vendor.description, Vendor.type, Vendor.sub_typeevent.category[]Event category classificationArray populated based on event type and description patterns
Vendor.moduleevent.datasetDataset classification (deception.audit or deception.threat)Conditional assignment based on Vendor.module field
Vendor.idevent.idEvent identifierCopied from Vendor.id
Noneevent.kindEvent categorizationStatic value: event
Noneevent.moduleModule nameStatic value: deception
Vendor.status_code, Vendor.username, Vendor.descriptionevent.outcomeEvent outcome (success/failure)Conditional assignment based on status codes and event type
Vendor.descriptionevent.reasonEvent descriptionCopied from Vendor.description
Vendor.scoreevent.risk_scoreRisk score of eventCopied from Vendor.score
log.levelevent.severityNumeric severity valueMapped from log.level using conditional logic
Vendor.module, Vendor.description, Vendor.type, Vendor.sub_typeevent.type[]Event type classificationArray populated based on event type and description patterns
Vendor.attacker.process.md5, Vendor.file.hash.md5file.hash.md5MD5 hashCoalesced from process and file hash fields
Vendor.attacker.process.sha1, Vendor.file.hash.sha1file.hash.sha1SHA1 hashCoalesced from process and file hash fields
Vendor.attacker.process.sha256, Vendor.file.hash.sha256file.hash.sha256SHA256 hashCoalesced from process and file hash fields
Vendor.file.namefile.pathFile pathCopied from Vendor.file.name
Vendor.recon.method, Vendor.web.method, Vendor.methodhttp.request.methodHTTP request methodCoalesced from method fields
Vendor.web.bytes_sent, Vendor.recon.bytes_senthttp.response.bytesHTTP response bytesCoalesced from bytes sent fields
Vendor.web.status, Vendor.recon.status, Vendor.status_codehttp.response.status_codeHTTP response statusCoalesced from status fields
Vendor.recon.server_protocol, Vendor.web.server_protocolhttp.versionHTTP versionExtracted from server protocol using regex
Vendor.severity, Vendor.threat.alert.severitylog.levelEvent severity levelCoalesced from severity fields
Vendor.decoy.network_namenetwork.nameNetwork nameCopied from Vendor.decoy.network_name
Vendor.recon.scheme, Vendor.web.schemenetwork.protocolNetwork protocolCoalesced from scheme fields
Vendor.network.protocolnetwork.transportNetwork transport protocolCopied from Vendor.network.protocol
Vendor.attacker.ip, Vendor.decoy.ipnetwork.typeNetwork type (ipv4/ipv6)Set based on IP version validation
Vendor.decoy.appliance.nameobserver.nameObserver appliance nameCopied from Vendor.decoy.appliance.name
Vendor.linux.command_line, Vendor.attacker.process.command_lineprocess.command_lineProcess command lineCoalesced from command line fields
Vendor.attacker.process.executable_path, Vendor.linux.process_nameprocess.executableProcess executableCoalesced from executable path fields
Vendor.attacker.process.md5process.hash.md5Process MD5 hashCopied from Vendor.attacker.process.md5
Vendor.attacker.process.sha1process.hash.sha1Process SHA1 hashCopied from Vendor.attacker.process.sha1
Vendor.attacker.process.sha256process.hash.sha256Process SHA256 hashCopied from Vendor.attacker.process.sha256
Vendor.linux.process_name, Vendor.attacker.process.nameprocess.nameProcess nameCoalesced from process name fields
Vendor.linux.parent_process_nameprocess.parent.nameParent process nameCopied from Vendor.linux.parent_process_name
Vendor.linux.ppidprocess.parent.pidParent process IDCopied from Vendor.linux.ppid
Vendor.linux.pidprocess.pidProcess IDCopied from Vendor.linux.pid
Vendor.linux.userprocess.user.nameProcess user nameCopied from Vendor.linux.user
Vendor.threat.alert.signature_idrule.idRule identifierCopied from Vendor.threat.alert.signature_id
Vendor.threat.alert.signaturerule.nameRule nameCopied from Vendor.threat.alert.signature
destination.addressserver.addressServer addressCopied from destination.address
destination.bytesserver.bytesServer bytes sentCopied from destination.bytes
destination.domainserver.domainServer domainCopied from destination.domain
destination.ipserver.ipServer IP addressCopied from destination.ip
destination.packetsserver.packetsServer packets sentCopied from destination.packets
destination.portserver.portServer portCopied from destination.port
source.ip, source.domainsource.addressSource addressCoalesced from source.ip and source.domain
Vendor.network.orig_ip_bytessource.bytesSource bytes sentCopied from Vendor.network.orig_ip_bytes
Vendor.attacker.namesource.domainSource domain nameLowercased from Vendor.attacker.name
Vendor.attacker.countrysource.geo.country_nameSource countryCopied from Vendor.attacker.country
Vendor.attacker.ipsource.ipSource IP addressCopied from Vendor.attacker.ip after IP validation
Vendor.network.orig_pktssource.packetsSource packets sentCopied from Vendor.network.orig_pkts
Vendor.attacker.portsource.portSource portCopied from Vendor.attacker.port
Vendor.attacker.ip, Vendor.abuseip.ipAddressthreat.indicator.ipThreat indicator IPExtracted from Vendor.attacker.ip or copied from Vendor.abuseip.ipAddress
Vendor.attacker.namethreat.indicator.nameThreat indicator nameCopied from Vendor.attacker.name
Vendor.attacker.portthreat.indicator.portThreat indicator portCopied from Vendor.attacker.port
Vendor.typethreat.indicator.typeThreat indicator typeCopied from Vendor.type
Vendor.sub_typethreat.tactic.name[]Threat tactic namesArray populated based on sub_type for specific events
Vendor.mitre_idsthreat.technique.id[]MITRE ATT&CK technique IDsArray populated from Vendor.mitre_ids using objectArray:eval
Vendor.ssl.ciphertls.cipherTLS cipherCopied from Vendor.ssl.cipher
Vendor.ssl.versiontls.versionTLS versionCopied from Vendor.ssl.version
Vendor.recon.host, Vendor.web.hosturl.domainURL domainCoalesced from host fields
Vendor.recon.uri, Vendor.web.uriurl.originalOriginal URLCoalesced from URI fields
Vendor.recon.request_uri, Vendor.recon.uri, Vendor.web.request_uri, Vendor.urlurl.pathURL pathCoalesced from URI fields
Vendor.recon.scheme, Vendor.web.schemeurl.schemeURL schemeCoalesced from scheme fields
Vendor.description, Vendor.attacker.zcc_useruser.emailUser email addressExtracted from Vendor.description using regex pattern or copied from Vendor.attacker.zcc_user
Vendor.usernameuser.full_nameFull user nameExtracted from Vendor.username using regex pattern
Vendor.azure.identity.claim.oiduser.idUser identifierCopied from Vendor.azure.identity.claim.oid
Vendor.usernameuser.nameUsernameExtracted from Vendor.username when not "Unauthenticated"
Vendor.web.user_agent.string, Vendor.recon.user_agent.stringuser_agent.originalUser agent stringCoalesced from user agent fields
Vendor.web.user_agent.patch, Vendor.recon.user_agent.patchuser_agent.versionUser agent versionCoalesced from user agent version fields