Hmmm. I can't pull the source from the audit log, as I have to turn that off to get auditbeat to run. Is this what you're after? (redacted a bit, b/c paranoia)
OS CentOS Linux release 7.6.1810 (Core) (system is under construction so it's most recent kernel from the repo).
{
"_index": "auditbeat-6.8.0-2019.05.01-000001",
"_type": "doc",
"_id": "B6RqUmsBpU7bo5LMCy3Q",
"_version": 1,
"_score": null,
"_source": {
"@timestamp": "2019-06-13T19:56:46.740Z",
"process": {
"pid": "28562",
"name": "auditbeat"
},
"auditd": {
"data": {
"ip": "0x7f502a063bc7",
"sig": "0",
"syscall": "95",
"arch": "c000003e",
"code": "0x50000",
"compat": "0"
},
"summary": {
"actor": {
"primary": "unset",
"secondary": "root"
},
"object": {
"type": "process",
"primary": "95"
},
"how": "auditbeat"
},
"sequence": 46792,
"result": "unknown",
"session": "unset"
},
"beat": {
"name": "redacted",
"hostname": "redacted",
"version": "6.8.0"
},
"host": {
"name": "redacted",
"id": "b97ee8e8fbeb4d18bcc27d8f3b95f554",
"containerized": true,
"architecture": "x86_64",
"os": {
"version": "7 (Core)",
"family": "redhat",
"name": "CentOS Linux",
"codename": "Core",
"platform": "centos"
}
},
"event": {
"category": "dac-decision",
"type": "seccomp",
"action": "violated-seccomp-policy",
"module": "auditd"
},
"user": {
"uid": "0",
"selinux": {
"domain": "unconfined_service_t",
"level": "s0",
"role": "system_r",
"user": "system_u"
},
"name_map": {
"gid": "root",
"uid": "root"
},
"gid": "0",
"auid": "unset"
}
},
"fields": {
"@timestamp": [
"2019-06-13T19:56:46.740Z"
]
},
"sort": [
1560455806740
]
}
If I'm understanding that aright, the syscall is umask