﻿---
title: Cisco fields
description: Module for handling Cisco network device logs. Module for parsing Cisco AMP logs. Fields for Cisco ASA Firewall. Fields for Cisco Firepower Threat Defense...
url: https://www.elastic.co/elastic/docs-builder/docs/3016/reference/beats/filebeat/exported-fields-cisco
products:
  - Beats
  - Filebeat
applies_to:
  - Elastic Cloud Serverless: Generally available
  - Elastic Stack: Generally available
---

# Cisco fields
Module for handling Cisco network device logs.

## cisco.amp

<applies-to>
  - Elastic Stack: Beta
</applies-to>

Module for parsing Cisco AMP logs.
<definitions>
  <definition term="cisco.amp.timestamp_nanoseconds">
    The timestamp in Epoch nanoseconds.
    type: date
  </definition>
  <definition term="cisco.amp.event_type_id">
    A sub ID of the event, depending on event type.
    type: keyword
  </definition>
  <definition term="cisco.amp.detection">
    The name of the malware detected.
    type: keyword
  </definition>
  <definition term="cisco.amp.detection_id">
    The ID of the detection.
    type: keyword
  </definition>
  <definition term="cisco.amp.connector_guid">
    The GUID of the connector sending information to AMP.
    type: keyword
  </definition>
  <definition term="cisco.amp.group_guids">
    An array of group GUIDS related to the connector sending information to AMP.
    type: keyword
  </definition>
  <definition term="cisco.amp.vulnerabilities">
    An array of related vulnerabilities to the malicious event.
    type: flattened
  </definition>
  <definition term="cisco.amp.scan.description">
    Description of an event related to a scan being initiated, for example the specific directory name.
    type: keyword
  </definition>
  <definition term="cisco.amp.scan.clean">
    Boolean value if a scanned file was clean or not.
    type: boolean
  </definition>
  <definition term="cisco.amp.scan.scanned_files">
    Count of files scanned in a directory.
    type: long
  </definition>
  <definition term="cisco.amp.scan.scanned_processes">
    Count of processes scanned related to a single scan event.
    type: long
  </definition>
  <definition term="cisco.amp.scan.scanned_paths">
    Count of different directories scanned related to a single scan event.
    type: long
  </definition>
  <definition term="cisco.amp.scan.malicious_detections">
    Count of malicious files or documents detected related to a single scan event.
    type: long
  </definition>
  <definition term="cisco.amp.computer.connector_guid">
    The GUID of the connector, similar to top level connector_guid, but unique if multiple connectors are involved.
    type: keyword
  </definition>
  <definition term="cisco.amp.computer.external_ip">
    The external IP of the related host.
    type: ip
  </definition>
  <definition term="cisco.amp.computer.active">
    If the current endpoint is active or not.
    type: boolean
  </definition>
  <definition term="cisco.amp.computer.network_addresses">
    All network interface information on the related host.
    type: flattened
  </definition>
  <definition term="cisco.amp.file.disposition">
    Categorization of file, for example "Malicious" or "Clean".
    type: keyword
  </definition>
  <definition term="cisco.amp.network_info.disposition">
    Categorization of a network event related to a file, for example "Malicious" or "Clean".
    type: keyword
  </definition>
  <definition term="cisco.amp.network_info.nfm.direction">
    The current direction based on source and destination IP.
    type: keyword
  </definition>
  <definition term="cisco.amp.related.mac">
    An array of all related MAC addresses.
    type: keyword
  </definition>
  <definition term="cisco.amp.related.cve">
    An array of all related MAC addresses.
    type: keyword
  </definition>
  <definition term="cisco.amp.cloud_ioc.description">
    Description of the related IOC for specific IOC events from AMP.
    type: keyword
  </definition>
  <definition term="cisco.amp.cloud_ioc.short_description">
    Short description of the related IOC for specific IOC events from AMP.
    type: keyword
  </definition>
  <definition term="cisco.amp.network_info.parent.disposition">
    Categorization of a IOC for example "Malicious" or "Clean".
    type: keyword
  </definition>
  <definition term="cisco.amp.network_info.parent.identity.md5">
    MD5 hash of the related IOC.
    type: keyword
  </definition>
  <definition term="cisco.amp.network_info.parent.identity.sha1">
    SHA1 hash of the related IOC.
    type: keyword
  </definition>
  <definition term="cisco.amp.network_info.parent.identify.sha256">
    SHA256 hash of the related IOC.
    type: keyword
  </definition>
  <definition term="cisco.amp.file.archived_file.disposition">
    Categorization of a file archive related to a file, for example "Malicious" or "Clean".
    type: keyword
  </definition>
  <definition term="cisco.amp.file.archived_file.identity.md5">
    MD5 hash of the archived file related to the malicious event.
    type: keyword
  </definition>
  <definition term="cisco.amp.file.archived_file.identity.sha1">
    SHA1 hash of the archived file related to the malicious event.
    type: keyword
  </definition>
  <definition term="cisco.amp.file.archived_file.identity.sha256">
    SHA256 hash of the archived file related to the malicious event.
    type: keyword
  </definition>
  <definition term="cisco.amp.file.attack_details.application">
    The application name related to Exploit Prevention events.
    type: keyword
  </definition>
  <definition term="cisco.amp.file.attack_details.attacked_module">
    Path to the executable or dll that was attacked and detected by Exploit Prevention.
    type: keyword
  </definition>
  <definition term="cisco.amp.file.attack_details.base_address">
    The base memory address related to the exploit detected.
    type: keyword
  </definition>
  <definition term="cisco.amp.file.attack_details.suspicious_files">
    An array of related files when an attack is detected by Exploit Prevention.
    type: keyword
  </definition>
  <definition term="cisco.amp.file.parent.disposition">
    Categorization of parrent, for example "Malicious" or "Clean".
    type: keyword
  </definition>
  <definition term="cisco.amp.error.description">
    Description of an endpoint error event.
    type: keyword
  </definition>
  <definition term="cisco.amp.error.error_code">
    The error code describing the related error event.
    type: keyword
  </definition>
  <definition term="cisco.amp.threat_hunting.severity">
    Severity result of the threat hunt registered to the malicious event. Can be Low-Critical.
    type: keyword
  </definition>
  <definition term="cisco.amp.threat_hunting.incident_report_guid">
    The GUID of the related threat hunting report.
    type: keyword
  </definition>
  <definition term="cisco.amp.threat_hunting.incident_hunt_guid">
    The GUID of the related investigation tracking issue.
    type: keyword
  </definition>
  <definition term="cisco.amp.threat_hunting.incident_title">
    Title of the incident related to the threat hunting activity.
    type: keyword
  </definition>
  <definition term="cisco.amp.threat_hunting.incident_summary">
    Summary of the outcome on the threat hunting activity.
    type: keyword
  </definition>
  <definition term="cisco.amp.threat_hunting.incident_remediation">
    Recommendations to resolve the vulnerability or exploited host.
    type: keyword
  </definition>
  <definition term="cisco.amp.threat_hunting.incident_id">
    The id of the related incident for the threat hunting activity.
    type: keyword
  </definition>
  <definition term="cisco.amp.threat_hunting.incident_end_time">
    When the threat hunt finalized or closed.
    type: date
  </definition>
  <definition term="cisco.amp.threat_hunting.incident_start_time">
    When the threat hunt was initiated.
    type: date
  </definition>
  <definition term="cisco.amp.file.attack_details.indicators">
    Different indicator types that matches the exploit detected, for example different MITRE tactics.
    type: flattened
  </definition>
  <definition term="cisco.amp.threat_hunting.tactics">
    List of all MITRE tactics related to the incident found.
    type: flattened
  </definition>
  <definition term="cisco.amp.threat_hunting.techniques">
    List of all MITRE techniques related to the incident found.
    type: flattened
  </definition>
  <definition term="cisco.amp.tactics">
    List of all MITRE tactics related to the incident found.
    type: flattened
  </definition>
  <definition term="cisco.amp.mitre_tactics">
    Array of all related mitre tactic ID's
    type: keyword
  </definition>
  <definition term="cisco.amp.techniques">
    List of all MITRE techniques related to the incident found.
    type: flattened
  </definition>
  <definition term="cisco.amp.mitre_techniques">
    Array of all related mitre technique ID's
    type: keyword
  </definition>
  <definition term="cisco.amp.command_line.arguments">
    The CLI arguments related to the Cloud Threat IOC reported by Cisco.
    type: keyword
  </definition>
  <definition term="cisco.amp.bp_data">
    Endpoint isolation information
    type: flattened
  </definition>
</definitions>


## cisco.asa

Fields for Cisco ASA Firewall.
<definitions>
  <definition term="cisco.asa.message_id">
    The Cisco ASA message identifier.
    type: keyword
  </definition>
  <definition term="cisco.asa.suffix">
    Optional suffix after %ASA identifier.
    type: keyword
    example: session
  </definition>
  <definition term="cisco.asa.source_interface">
    Source interface for the flow or event.
    type: keyword
  </definition>
  <definition term="cisco.asa.destination_interface">
    Destination interface for the flow or event.
    type: keyword
  </definition>
  <definition term="cisco.asa.rule_name">
    Name of the Access Control List rule that matched this event.
    type: keyword
  </definition>
  <definition term="cisco.asa.source_username">
    Name of the user that is the source for this event.
    type: keyword
  </definition>
  <definition term="cisco.asa.source_user_security_group_tag">
    The Security Group Tag for the source user. Security Group Tag are 16-bit identifiers used to represent logical group privilege.
    type: long
  </definition>
  <definition term="cisco.asa.destination_username">
    Name of the user that is the destination for this event.
    type: keyword
  </definition>
  <definition term="cisco.asa.destination_user_security_group_tag">
    The Security Group Tag for the destination user. Security Group Tag are 16-bit identifiers used to represent logical group privilege.
    type: long
  </definition>
  <definition term="cisco.asa.mapped_source_ip">
    The translated source IP address.
    type: ip
  </definition>
  <definition term="cisco.asa.mapped_source_host">
    The translated source host.
    type: keyword
  </definition>
  <definition term="cisco.asa.mapped_source_port">
    The translated source port.
    type: long
  </definition>
  <definition term="cisco.asa.mapped_destination_ip">
    The translated destination IP address.
    type: ip
  </definition>
  <definition term="cisco.asa.mapped_destination_host">
    The translated destination host.
    type: keyword
  </definition>
  <definition term="cisco.asa.mapped_destination_port">
    The translated destination port.
    type: long
  </definition>
  <definition term="cisco.asa.threat_level">
    Threat level for malware / botnet traffic. One of very-low, low, moderate, high or very-high.
    type: keyword
  </definition>
  <definition term="cisco.asa.threat_category">
    Category for the malware / botnet traffic. For example: virus, botnet, trojan, etc.
    type: keyword
  </definition>
  <definition term="cisco.asa.connection_id">
    Unique identifier for a flow.
    type: keyword
  </definition>
  <definition term="cisco.asa.icmp_type">
    ICMP type.
    type: short
  </definition>
  <definition term="cisco.asa.icmp_code">
    ICMP code.
    type: short
  </definition>
  <definition term="cisco.asa.connection_type">
    The VPN connection type
    type: keyword
  </definition>
  <definition term="cisco.asa.dap_records">
    The assigned DAP records
    type: keyword
  </definition>
  <definition term="cisco.asa.command_line_arguments">
    The command line arguments logged by the local audit log
    type: keyword
  </definition>
  <definition term="cisco.asa.assigned_ip">
    The IP address assigned to a VPN client successfully connecting
    type: ip
  </definition>
  <definition term="cisco.asa.privilege.old">
    When a users privilege is changed this is the old value
    type: keyword
  </definition>
  <definition term="cisco.asa.privilege.new">
    When a users privilege is changed this is the new value
    type: keyword
  </definition>
  <definition term="cisco.asa.burst.object">
    The related object for burst warnings
    type: keyword
  </definition>
  <definition term="cisco.asa.burst.id">
    The related rate ID for burst warnings
    type: keyword
  </definition>
  <definition term="cisco.asa.burst.current_rate">
    The current burst rate seen
    type: keyword
  </definition>
  <definition term="cisco.asa.burst.configured_rate">
    The current configured burst rate
    type: keyword
  </definition>
  <definition term="cisco.asa.burst.avg_rate">
    The current average burst rate seen
    type: keyword
  </definition>
  <definition term="cisco.asa.burst.configured_avg_rate">
    The current configured average burst rate allowed
    type: keyword
  </definition>
  <definition term="cisco.asa.burst.cumulative_count">
    The total count of burst rate hits since the object was created or cleared
    type: keyword
  </definition>
  <definition term="cisco.asa.termination_user">
    AAA name of user requesting termination
    type: keyword
  </definition>
  <definition term="cisco.asa.webvpn.group_name">
    The WebVPN group name the user belongs to
    type: keyword
  </definition>
  <definition term="cisco.asa.termination_initiator">
    Interface name of the side that initiated the teardown
    type: keyword
  </definition>
  <definition term="cisco.asa.tunnel_type">
    SA type (remote access or L2L)
    type: keyword
  </definition>
  <definition term="cisco.asa.session_type">
    Session type (for example, IPsec or UDP)
    type: keyword
  </definition>
</definitions>


## cisco.ftd

Fields for Cisco Firepower Threat Defense Firewall.
<definitions>
  <definition term="cisco.ftd.message_id">
    The Cisco FTD message identifier.
    type: keyword
  </definition>
  <definition term="cisco.ftd.suffix">
    Optional suffix after %FTD identifier.
    type: keyword
    example: session
  </definition>
  <definition term="cisco.ftd.source_interface">
    Source interface for the flow or event.
    type: keyword
  </definition>
  <definition term="cisco.ftd.destination_interface">
    Destination interface for the flow or event.
    type: keyword
  </definition>
  <definition term="cisco.ftd.rule_name">
    Name of the Access Control List rule that matched this event.
    type: keyword
  </definition>
  <definition term="cisco.ftd.source_username">
    Name of the user that is the source for this event.
    type: keyword
  </definition>
  <definition term="cisco.ftd.destination_username">
    Name of the user that is the destination for this event.
    type: keyword
  </definition>
  <definition term="cisco.ftd.mapped_source_ip">
    The translated source IP address. Use ECS source.nat.ip.
    type: ip
  </definition>
  <definition term="cisco.ftd.mapped_source_host">
    The translated source host.
    type: keyword
  </definition>
  <definition term="cisco.ftd.mapped_source_port">
    The translated source port. Use ECS source.nat.port.
    type: long
  </definition>
  <definition term="cisco.ftd.mapped_destination_ip">
    The translated destination IP address. Use ECS destination.nat.ip.
    type: ip
  </definition>
  <definition term="cisco.ftd.mapped_destination_host">
    The translated destination host.
    type: keyword
  </definition>
  <definition term="cisco.ftd.mapped_destination_port">
    The translated destination port. Use ECS destination.nat.port.
    type: long
  </definition>
  <definition term="cisco.ftd.threat_level">
    Threat level for malware / botnet traffic. One of very-low, low, moderate, high or very-high.
    type: keyword
  </definition>
  <definition term="cisco.ftd.threat_category">
    Category for the malware / botnet traffic. For example: virus, botnet, trojan, etc.
    type: keyword
  </definition>
  <definition term="cisco.ftd.connection_id">
    Unique identifier for a flow.
    type: keyword
  </definition>
  <definition term="cisco.ftd.icmp_type">
    ICMP type.
    type: short
  </definition>
  <definition term="cisco.ftd.icmp_code">
    ICMP code.
    type: short
  </definition>
  <definition term="cisco.ftd.security">
    Raw fields for Security Events.
    type: object
  </definition>
  <definition term="cisco.ftd.connection_type">
    The VPN connection type
    type: keyword
  </definition>
  <definition term="cisco.ftd.dap_records">
    The assigned DAP records
    type: keyword
  </definition>
  <definition term="cisco.ftd.termination_user">
    AAA name of user requesting termination
    type: keyword
  </definition>
  <definition term="cisco.ftd.webvpn.group_name">
    The WebVPN group name the user belongs to
    type: keyword
  </definition>
  <definition term="cisco.ftd.termination_initiator">
    Interface name of the side that initiated the teardown
    type: keyword
  </definition>
</definitions>


## cisco.ios

Fields for Cisco IOS logs.
<definitions>
  <definition term="cisco.ios.access_list">
    Name of the IP access list.
    type: keyword
  </definition>
  <definition term="cisco.ios.facility">
    The facility to which the message refers (for example, SNMP, SYS, and so forth). A facility can be a hardware device, a protocol, or a module of the system software. It denotes the source or the cause of the system message.
    type: keyword
    example: SEC
  </definition>
</definitions>


## cisco.umbrella

Fields for Cisco Umbrella.
<definitions>
  <definition term="cisco.umbrella.identities">
    An array of the different identities related to the event.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.categories">
    The security or content categories that the destination matches.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.policy_identity_type">
    The first identity type matched with this request. Available in version 3 and above.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.identity_types">
    The type of identity that made the request. For example, Roaming Computer or Network.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.blocked_categories">
    The categories that resulted in the destination being blocked. Available in version 4 and above.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.content_type">
    The type of web content, typically text/html.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.sha_sha256">
    Hex digest of the response content.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.av_detections">
    The detection name according to the antivirus engine used in file inspection.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.puas">
    A list of all potentially unwanted application (PUA) results for the proxied file as returned by the antivirus scanner.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.amp_disposition">
    The status of the files proxied and scanned by Cisco Advanced Malware Protection (AMP) as part of the Umbrella File Inspection feature; can be Clean, Malicious or Unknown.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.amp_malware_name">
    If Malicious, the name of the malware according to AMP.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.amp_score">
    The score of the malware from AMP. This field is not currently used and will be blank.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.datacenter">
    The name of the Umbrella Data Center that processed the user-generated traffic.
    type: keyword
  </definition>
  <definition term="cisco.umbrella.origin_id">
    The unique identity of the network tunnel.
    type: keyword
  </definition>
</definitions>