Skip to main content

AlphaSOC for Splunk

Overview

The AlphaSOC for Splunk app surfaces AlphaSOC findings directly within Splunk. Use the built-in dashboards to triage threats, investigate entities, and pivot to raw OCSF findings — all without leaving Splunk. The app also includes the alphasoc generating command for running targeted searches over OCSF telemetry stored in AlphaSOC's data lake.

Installation

You can find the AlphaSOC for Splunk app in the Splunkbase apps catalog.

The AlphaSOC Data Lake Search feature is currently in beta. Contact AlphaSOC support to request access.

Configuration

To connect the AlphaSOC for Splunk app to your Analytics Engine, generate an API key in the AlphaSOC Console and configure it in Splunk. Follow the steps below.

  1. Navigate to the AlphaSOC Console.
  2. Go to the Credentials section and click API Keys. asoc-credentials
  3. Click on New API key button and, optionally, provide a description for the new key. asoc-new-api-key
  4. Click Create to create the API key.
  5. Copy the generated API key and keep it in a secure place, as you will need it to configure the integration with Splunk. asoc-new-api-key-save
  6. In the AlphaSOC for Splunk app, go to the Settings tab. splunk-api-key
  7. Click on the Analytics Engine and, under API Key, paste the copied API key into the designated field.
  8. Click Save to apply the changes.
  9. Still in the Settings tab, click on Data Location. Select the Splunk index containing your AlphaSOC findings from the dropdown (e.g., alphasoc_findings). alphasoc-findings-index

Investigating Threats

The AlphaSOC for Splunk app provides three views that form an investigation workflow — from high-level threat overview down to raw OCSF findings.

Threat Hunter

The Threat Hunter dashboard is the default landing page. It displays a prioritized table of all entities with active detections in your environment.

threat-hunter

Each row represents an entity (IP address, hostname, AWS ARN, Kubernetes service account, etc.) and includes:

  • Severity — highest severity level assigned to the entity's findings.
  • Entity — the identifier of the affected host or account.
  • Domain — event domain: Network, System, or Application.
  • Top Detection — the name of the highest-priority detection for this entity.
  • Last Seen — timestamp of the most recent finding.
  • Trend — sparkline showing finding volume over the selected time range.
  • Detections — number of distinct detection rules that fired.
  • Findings — total count of findings associated with the entity.

Use the filter bar at the top to narrow results by time range, event domain, entity, detection type, and minimum severity. Rows are color-coded by severity — Critical, High, Medium — so the most urgent items stand out at a glance.

MITRE ATT&CK

The MITRE ATT&CK dashboard maps the same findings onto the MITRE ATT&CK Matrix for Enterprise. Columns represent tactics, and each cell lists the techniques AlphaSOC has observed in your environment.

mitre-attack

Use this view to assess attacker coverage across the kill chain rather than triaging individual entities.

Findings Explorer

From the Threat Hunter table, click on any entity row to open the Findings Explorer. This is the investigation dashboard for a single entity.

findings-explorer

Investigation Details

The left panel summarizes the entity under investigation:

  • Entity identifier — the IP address, hostname, or account (e.g., 172.25.163.137).
  • Severity — the highest severity across all findings for this entity.
  • Total findings — aggregate count of findings.
  • First seen / Last seen — the time window over which activity was observed.
  • Event domain — Network, System, or Application.
  • Unique entities — count of distinct entities involved.
  • Tactics and Techniques — MITRE ATT&CK tactics and techniques mapped to the entity's findings.

Summary Cards

Four cards across the top provide at-a-glance counts: Entities, Detections, Findings, and Techniques. Use these to gauge the scope of the investigation — how many detection rules fired, how many total findings were generated, and how many ATT&CK techniques are in play.

Activity Timeline

The timeline chart plots finding volume over the selected time range. Use it to identify spikes, sustained activity, or beaconing patterns. The legend indicates the detection type (e.g., "C2 communication attempt indicating infection").

Severity Distribution

The donut chart breaks down findings by severity level. A chart dominated by Critical indicates an entity that needs immediate attention.

Observables, Detections, Entities, and Samples

The tabbed section at the bottom provides the detailed breakdown:

  • Observables — lists every observable associated with the entity's findings: queried hostnames, destination IPs, destination ports. Each row shows severity, first/last seen timestamps, the observable value, its type (Hostname, IP Address, Port), and the number of findings it appears in.
  • Detections — groups findings by detection name.
  • Entities — lists all entities involved.
  • Samples — shows detailed information about the findings.

Pivoting to Raw Findings

Each observable row includes an Actions menu (three-dot icon). Click it to open the raw OCSF findings in Splunk Search.

splunk-search

This opens a pre-populated search that retrieves the AlphaSOC OCSF findings matching that observable. Each event in the results includes:

  • Event metadata — event code, timestamps, and source identifiers.
  • Detection details — detection name, severity score, confidence level, and MITRE ATT&CK mapping.
  • Observables — the full set of observables: queried hostnames, resolved IPs, destination endpoints, ports, and protocols.
  • Evidence and context — supporting data such as DNS query types, response codes, connection metadata, and threat intelligence enrichment.

Use the Splunk field sidebar to filter, aggregate, or correlate across the dataset. From here you can build additional searches, create alerts, or export the data into your existing workflows.

The alphasoc command lets you run targeted searches over OCSF telemetry stored in AlphaSOC's data lake — directly from Splunk Search. Use it independently from the dashboards above when you need to query raw telemetry by specific OCSF fields.

Basic syntax

The alphasoc command is a generating search command — it must appear at the beginning of your search pipeline, prefixed with a pipe (|). Use the Splunk time picker to set the time range for your query.

00splunk-search

| alphasoc [class_name=<classes>] [log_source=<sources>] [<filter_expression>]

Filters

Filters are field-value pairs using OCSF field paths. Combine them with AND / OR operators and parentheses.

  • AND is implicit — adjacent filters without an operator are combined with AND. For example, device.ip=10.0.0.5 dst_endpoint.port=443 is equivalent to device.ip=10.0.0.5 AND dst_endpoint.port=443.
  • AND has higher precedence than OR. Use parentheses to make grouping explicit when mixing both.
OCSF FieldDescriptionExample
device.ipDevice IP address10.0.0.5
device.hostnameDevice hostnameworkstation-01
device.uidDevice identifier (e.g., CrowdStrike AID)09e8771fc488477d9cddb61b5fd32c6c
device.macDevice MAC address00:1A:2B:3C:4D:5E
query.hostnameDNS query fully qualified domain name (FQDN)www.google.com
query.typeDNS query typeA
dst_endpoint.ipDestination IP address8.8.8.8
dst_endpoint.portDestination port443
connection_info.protocol_nameIP protocoltcp
http_request.http_methodHTTP client request methodGET
http_request.user_agentHTTP client user agentMozilla/5.0 (X11; Linux x86_64)
tls.certificate.fingerprintTLS server certificate fingerprint0db6495611891de35650a18ad91002845f9cc6bc
tls.certificate.subjectTLS server certificate subjectCN=example.com
tls.certificate.issuerTLS server certificate issuerCN=GTS CA,O=Google Trust Services,C=US
src_endpoint.ipSource IP address192.0.2.10
metadata.product.uidProduct UID that matches AlphaSOCs dataScopeaws:123456789012:us-east-1:vpc-1234567890
actor.user.nameUser namealice

Reserved filters

These two filters are separate from the filter expression and cannot be part of it. Each can only be specified once per query:

  • class_name — Comma-separated OCSF event classes. Accepts title case, snake_case, or dash-separated formats. Examples: "dns_activity", "DNS Activity", "dns-activity"
  • log_source — Comma-separated data origins. See AlphaSOC data origins documentation for the complete list.

Examples

Fetch all events in the selected time range:

| alphasoc

Filter by device IP:

| alphasoc device.ip=10.0.0.5

Combine filters with implicit AND (both forms are equivalent):

| alphasoc device.ip=10.0.0.5 dst_endpoint.port=443

Filter by event class and device:

| alphasoc class_name=dns_activity device.ip=10.0.0.5

Combine multiple filters with boolean logic:

| alphasoc class_name="dns_activity, network_activity" device.ip=10.0.0.5 AND (query.hostname=evil.com OR dst_endpoint.port=443)

Query a specific data origin:

| alphasoc log_source="aws-route53" query.hostname=example.com

Streaming and limits

Results are streamed — events appear in Splunk as they are received from the data lake. Large result sets may be capped by a server-side limit, in which case a partial result set is returned. To reduce the result set, use a shorter time range or more specific filters.

Display help

Run the following to display a quick reference of available filters and syntax directly in Splunk:

| alphasoc help

Learn more

Interested in trying out the AlphaSOC for Splunk? Contact AlphaSOC support to request access to the app and get started today!