-
Notifications
You must be signed in to change notification settings - Fork 12
Open
Description
This is an enhancement request for adding the ability to generate alerts that will show up when running the AI4SOC product tier. Here are a couple sample alerts that @pborgonovi shared with me from two of the supported integrations.
Splunk Alert
{
"_index": ".ds-logs-splunk.alert-default-2025.08.06-000001",
"_id": "9OaVf0pi2iiaNVou2OoPyqU9u4M=",
"_score": 1,
"_source": {
"@timestamp": "2025-08-06T22:45:20.000Z",
"agent": {
"ephemeral_id": "03b5b12c-bdc1-4771-995a-e661b2fce477",
"id": "971b8243-30b3-48b5-ad95-c64b40daf24f",
"name": "elastic-agent-17375",
"type": "filebeat",
"version": "8.18.0"
},
"data_stream": {
"dataset": "splunk.alert",
"namespace": "default",
"type": "logs"
},
"destination": {
"ip": [
"10.0.0.5"
]
},
"ecs": {
"version": "8.17.0"
},
"elastic_agent": {
"id": "971b8243-30b3-48b5-ad95-c64b40daf24f",
"snapshot": true,
"version": "8.18.0"
},
"event": {
"agent_id_status": "auth_metadata_missing",
"dataset": "splunk.alert",
"ingested": "2025-08-06T22:17:00Z",
"kind": "alert",
"original": """{"search_name": "Suspicious File Access", "app": "windows-sysmon", "ip": "10.0.0.5", "src": "203.0.113.46", "orig_tag": ["file", "access"], "user_count": "1", "unique_id": "0641769e-2864-4953-bf3a-996216e5936d"}""",
"severity": 73,
"severity_label": "high",
"type": [
"info"
]
},
"file": {
"hash": {
"sha256": "8278d01dcaf547ad8318978813e227f0"
},
"path": """C:\Temp\data.zip"""
},
"host": {
"geo": {
"city_name": "New York",
"continent_name": "North America",
"country_iso_code": "US",
"country_name": "United States",
"location": {
"lat": 40.712799984030426,
"lon": -74.00600004941225
},
"region_iso_code": "US-NY",
"region_name": "New York"
},
"ip": [
"10.0.0.5"
],
"name": "host-dc-01"
},
"input": {
"type": "cel"
},
"related": {
"hosts": [
"host-dc-01"
],
"ip": [
"203.0.113.46",
"10.0.0.5"
]
},
"rule": {
"name": "Suspicious File Access"
},
"source": {
"address": "203.0.113.46",
"as": {
"number": 15169,
"organization": {
"name": "Google LLC"
}
},
"geo": {
"city_name": "New York",
"continent_name": "North America",
"country_iso_code": "US",
"country_name": "United States",
"location": {
"lat": 40.712799984030426,
"lon": -74.00600004941225
},
"region_iso_code": "US-NY",
"region_name": "New York"
},
"ip": [
"203.0.113.46"
]
},
"splunk": {
"alert": {
"app": "windows-sysmon",
"orig_tag": [
"file",
"access"
],
"search_name": "Suspicious File Access",
"unique_id": "0641769e-2864-4953-bf3a-996216e5936d",
"user_count": 1
}
},
"tags": [
"preserve_original_event",
"forwarded",
"splunk-alert"
],
"user": {
"name": "bob"
}
}
},Sentinel One Alert
{
"_index": ".ds-logs-sentinel_one.alert-default-2025.08.06-000001",
"_id": "/6wVG2wxR/3CXRxk3GK0aN+hxL8=",
"_score": 1,
"_source": {
"@timestamp": "2025-08-07T09:07:24.810Z",
"agent": {
"ephemeral_id": "6fdcbedd-e735-4681-885b-0fc468a0248a",
"id": "MmQ1ZDk4ZDgtNzMxMC0xMWYwLWJiZWItMDJlN2NhZmQ5NjM1",
"name": "agentless-cdc5ec8d-4380-4aac-9319-cfd2e4af752d-6758fbbf7f-lss27",
"type": "filebeat",
"version": "9.2.0"
},
"data_stream": {
"dataset": "sentinel_one.alert",
"namespace": "default",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "MmQ1ZDk4ZDgtNzMxMC0xMWYwLWJiZWItMDJlN2NhZmQ5NjM1",
"snapshot": true,
"version": "9.2.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"malware"
],
"created": "2025-08-07T09:07:28.049Z",
"dataset": "sentinel_one.alert",
"id": "2276071318271429894",
"ingested": "2025-08-07T09:07:37Z",
"kind": "event",
"severity": 99,
"type": [
"info"
]
},
"file": {
"created": "1970-01-01T00:00:00.000Z",
"mtime": "1970-01-01T00:00:00.000Z"
},
"host": {
"id": "2097738178340462650",
"name": "ip-172-31-91-187",
"os": {
"family": "linux",
"name": "Linux",
"type": "linux",
"version": "Ubuntu 24.04.1 LTS 6.8.0-1031-aws"
},
"type": "server"
},
"input": {
"type": "httpjson"
},
"message": "Test6",
"observer": {
"serial_number": "0df1d701-1ff1-96c7-12e4-0be8ffa8d628",
"version": "23.3.2.12"
},
"process": {
"command_line": "su",
"entity_id": "59c3051a-ce76-9354-136c-bad5d1f9e0fd",
"executable": "/usr/bin/su",
"hash": {
"sha1": "9912c33e76476defd289c93952250dff4e583c88"
},
"name": "su",
"parent": {
"command_line": "sudo su",
"entity_id": "59c30518-595d-cda2-51ef-6e5466fcad9c",
"executable": "/usr/bin/sudo",
"hash": {
"sha1": "8f860202c9089989e5b7356bc99e9e3460c41d12"
},
"name": "sudo",
"pid": 1308,
"start": "2025-08-07T09:05:11.320Z",
"user": {
"name": "Effective: root, Real: ubuntu, Login: ubuntu"
}
},
"pid": 1309,
"start": "2025-08-07T09:05:11.320Z",
"user": {
"name": "Effective: root, Real: root, Login: ubuntu"
}
},
"related": {
"hash": [
"8f860202c9089989e5b7356bc99e9e3460c41d12",
"9912c33e76476defd289c93952250dff4e583c88"
],
"hosts": [
"ip-172-31-91-187"
]
},
"rule": {
"description": "sudo su",
"id": "1950744398317815020",
"name": "Test6"
},
"sentinel_one": {
"alert": {
"agent": {
"computer_name": "ip-172-31-91-187",
"id": "2097738178340462650",
"infected": true,
"is_active": true,
"is_decommissioned": false,
"machine_type": "server",
"os": {
"type": "linux"
},
"site_id": "1392053568582758390"
},
"analyst_verdict": "Undefined",
"dv_event": {
"id": "01K21WH65PYQ74CXT34TGM1YNX_67"
},
"info": {
"event_type": "PROCESSCREATION",
"hit": {
"type": "Events"
},
"reported_at": "2025-08-07T09:07:24.817Z",
"source": "STAR",
"status": "Unresolved",
"updated_at": "2025-08-07T09:07:24.817Z"
},
"process": {
"integrity_level": "unknown",
"parent": {
"integrity_level": "unknown",
"storyline": "59c18934-a605-29e0-9f47-402071e2ebf2",
"subsystem": "unknown"
},
"storyline": "59c18934-a605-29e0-9f47-402071e2ebf2",
"subsystem": "unknown"
},
"rule": {
"scope_level": "site",
"severity": "Critical",
"treat_as_threat": "Suspicious"
},
"target": {
"process": {
"proc": {
"cmdline": "bash",
"image_path": "/bin/bash",
"integrity_level": "unknown",
"name": "bash",
"pid": 1310,
"signed_status": "unsigned",
"storyline_id": "59c18934-a605-29e0-9f47-402071e2ebf2",
"uid": "59c30525-903d-2ad4-4cb0-76d4b871f9c6"
},
"start_time": "2025-08-07T09:05:11.330Z"
}
}
}
},
"tags": [
"forwarded",
"sentinel_one-alert"
]
}
},Google SecOps
{
"_index": ".ds-logs-google_secops.alert-default-2025.08.06-000001",
"_id": "AZiBfdgNX7Ai-5AC0w-T",
"_score": 1,
"_source": {
"@timestamp": "2025-08-06T22:53:31.000Z",
"agent": {
"ephemeral_id": "03b5b12c-bdc1-4771-995a-e661b2fce477",
"id": "971b8243-30b3-48b5-ad95-c64b40daf24f",
"name": "elastic-agent-17375",
"type": "filebeat",
"version": "8.18.0"
},
"data_stream": {
"dataset": "google_secops.alert",
"namespace": "default",
"type": "logs"
},
"destination": {
"ip": [
"10.0.0.5"
]
},
"ecs": {
"version": "8.17.0"
},
"elastic_agent": {
"id": "971b8243-30b3-48b5-ad95-c64b40daf24f",
"snapshot": true,
"version": "8.18.0"
},
"event": {
"agent_id_status": "auth_metadata_missing",
"dataset": "google_secops.alert",
"ingested": "2025-08-06T22:25:10Z",
"kind": "alert",
"risk_score": 73,
"severity": 73,
"type": [
"info"
]
},
"file": {
"hash": {
"sha256": "abeae8aa644e42c49f8bce7cd862f6ec"
},
"path": """C:\Windows\System32\secret.txt"""
},
"google_secops": {
"alert": {
"event": {
"metadata": {
"eventTimestamp": "2025-08-06T22:53:31.000Z",
"ingestedTimestamp": "2025-08-06T22:24:43.000Z"
},
"securityResult": [
{
"severity": "HIGH"
}
]
},
"friendly_name": "Suspicious File Access"
}
},
"host": {
"geo": {
"city_name": "New York",
"continent_name": "North America",
"country_iso_code": "US",
"country_name": "United States",
"region_iso_code": "US-NY",
"region_name": "New York"
},
"ip": [
"10.0.0.5"
],
"name": "host-fileserver"
},
"input": {
"type": "cel"
},
"message": "Suspicious file access detected on 10.0.0.5",
"observer": {
"product": "SimSec",
"vendor": "Elastic"
},
"related": {
"ip": [
"203.0.113.45",
"10.0.0.5"
]
},
"rule": {
"description": "Suspicious file access detected on 10.0.0.5",
"id": "r-cb0401b0-c95e-46c3-8c2a-fe52addf1a38",
"name": "Suspicious File Access",
"version": "1.0"
},
"source": {
"address": "203.0.113.45",
"as": {
"number": 15169,
"organization": {
"name": "Google LLC"
}
},
"geo": {
"city_name": "Mountain View",
"continent_name": "North America",
"country_iso_code": "US",
"country_name": "United States",
"location": {
"lat": 37.38609998021275,
"lon": -122.08390002138913
},
"region_iso_code": "US-CA",
"region_name": "California"
},
"ip": [
"203.0.113.45"
]
},
"tags": [
"forwarded",
"google-secops-alert"
],
"user": {
"name": "bob"
}
}
},Metadata
Metadata
Assignees
Labels
No labels