Change log for FIREEYE_ALERT

Date Changes
2024-02-26 Enhancement:
- Mapped "alert.explanation.os-changes.os.name" to "principal.platform".
- Mapped "alert.explanation.os-changes.file.processinfo.sha1sum" to "principal.file.sha1".
- Mapped "alert.explanation.os-changes.file.processinfo.md5sum" to "principal.file.md5".
- Mapped "alert.explanation.os-changes.file.processinfo.ppid" to "principal.process.parent_process.pid".
- Mapped "alert.explanation.os-changes.file.processinfo.imagepath" to "target.file.full_path".
- Mapped "alert.explanation.os-changes.file.processinfo.tid" to "target.process.pid".
- Mapped "alert.explanation.os-changes.file.processinfo.pid" to "principal.process.pid".
- Mapped "alert.explanation.malware-detected.malware.tests.sha256" to "target.process.file.sha256".
- Mapped "alert.explanation.malware-detected.malware.tests.sha1" to "target.process.file.sha1".
- Mapped "alert.explanation.malware-detected.malware.tests.md5sum" to "target.process.file.md5".
- Mapped "alert.explanation.os-changes.os.build", "alert.ack", "alert.sc-version", "alert.explanation.analysis", "alert.retroactive", "alert.explanation.os-changes.malicious-alert.classtype", "alert.explanation.os-changes.malicious-alert.display-msg", "alert.explanation.os-changes.html.timestamp", "alert.explanation.os-changes.html.timestamp", "alert.explanation.os-changes.html.url", "alert.explanation.os-changes.html.mode", "alert.explanation.os-changes.html.sequence", "alert.explanation.os-changes.html.id", "alert.explanation.os-changes.html.value", "alert.explanation.malware-detected.malware.tests.downloaded-at", "alert.explanation.malware-detected.malware.tests.submitted-at", "alert.explanation.malware-detected.malware.tests.executed-at", "alert.explanation.malware-detected.malware.tests.sha512", "alert.explanation.malware-detected.malware.tests.type", "alert.explanation.malware-detected.malware.tests.http-header", and "alert.explanation.malware-detected.malware.tests.original" to "security_result.detection_fields".
2024-02-15 Enhancement:
- Mapped "alert.explanation.malware-detected.malware.http-header" to "security_result.detection_fields".
- Mapped "alert.explanation.malware-detected.malware.name" to "security_result.category_details".
- Mapped "alert.explanation.malware-detected.malware.objurl" to "security_result.about.url".
- Aligned "target.ip", "target.hostname", "target.asset.ip" and "target.asset.hostname" mappings.
- Aligned "principal.ip", "principal.hostname" and "principal.asset.ip", "principal.asset.hostname" mappings.
2024-01-12 Enhancement:
- Mapped "alert.explanation.cnc-services.cnc-service.channel", "content_type", "content_length", and "cache_control" to "additional.fields".
- Mapped "alert.explanation.cnc-services.cnc-service.url" to "target.url".
- Mapped "ver_proto" to "network.tls.version_protocol".
- Mapped "src_data" to "principal.ip".
- Mapped "http_user_agent" to "network.http.user_agent".
- Mapped "method" to "network.http.method".
2023-12-05 Enhancement:
- Mapped "alert.explanation.malware-detected.malware.name", "alert.explanation.malware-detected.malware.sid", "alert.explanation.malware-detected.malware.stype", "alert.explanation.cnc-services.cnc-service.type" to "security_result.detection_fields".
2023-11-09 Enhancement:
- Mapped "alert.explanation.malware-detected.malware.http-header" to "security_result.detection_fields".
- Mapped "alert.explanation.malware-detected.malware.objurl" to "security_result.about.url".
2023-09-29 Enhancement:
- Adjusted the parser to support JSON format logs along with SYSLOG + JSON.
- Mapped "alert.explanation.malware-detected.malware.1.objurl" to "security_result.about.url".
2022-08-26 Enhancement:
- Mapped "action_taken" to "security_result.summary".
- Mapped "sig-revision", "sig-name" , "sig-id", "attack-mode", "mvx-status" to "security_result.about.labels".
- Mapped "ips-detected.cve-id" to "principal.asset.vulnerabilities".
- Mapped "sensor" to "intermediary.hostname".
- Mapped "appliance-id", "match-count" to "additional.fields".
2022-08-09 Enhancement:
- Mapped "alert.dst.smtp-to" to "network.email.to".
- Added conditional check for "sec_result.category_details".
- Mapped "process_md5" to "target.process.file.md5".
- Mapped "endpoint_type" to "security_result.about.labels".
- Mapped "name" to "metadata.description".
- Mapped "source_info.ip" to "principal.ip".
- Mapped "id" to "principal.resource.id".
- Mapped "customer_id" to "target.resource.id".
- Mapped "group" to "security_result.category_details".
- Mapped "process" to "principal.process.pid".
- Mapped "principal_host" to "principal.hostname".
- Mapped "description" to "metadata.description".
- Mapped "severity" to "security_result.severity".