Hello wazuh team! I ran into a problem, my new log decodes the built-in windows_eventchannel decoder. But the problem is that it doesn't decode all the fields I need, unfortunately I couldn't write a decoder for the fields I need on my own, I'd be happy if you could help. {"win":{"system":{"providerName":"csp","eventID":"100","version":"0","level":"0","task":"0","opcode":"0","keywords":"0x80000000000000","systemTime":"2025-11-11T04:26:01.8665798Z","eventRecordID":"49729","processID":"5248","threadID":"0","channel":"Application","computer":"
NB1.nat.ru","severityValue":"UNKNOWN","message":"\"CryptoPro CSP. <csp>0x1480:0x2074:CPCAcquireContext (pszContainer=REGISTRY\\\\98563895@2025-10-10-Name - Copy, dwFlags=0x0). Result=1, Err=0x0. hProv=0x7e10008b. (:517)\""},"eventdata":{"data":"<csp>0x1480:0x2074:CPCAcquireContext (pszContainer=REGISTRY\\\\\\\\98563895@2025-10-10-Name - Copy, dwFlags=0x0). Result=1, Err=0x0. hProv=0x7e10008b. (:517)"}}} here is the log itself and the field that I want to decode normally 2025-10-10-Name , that is, I want it to output pszContainer = 2025-10-10-Name, so that it can be clearly seen in the rule later, and the corresponding rule for it, thank you in advance