Skip to main content

Data Normalization

Network

Network events provide insight into network traffic within the organization. Log entries contain details about an egress connection.

DNS

This type of telemetry captures egress DNS query events for valid internet domains, providing visibility into domain resolution activity.

AlphaSOC can process DNS data from these sources: AWS Route 53, Zeek, GCP Cloud DNS, Crowdstrike FDR, DNSTap, Azure Device Network.

AlphaSOC fieldDescription
query A fully qualified domain name (FQDN)
qtype A DNS record type
rcodeA DNS response code
tsThe associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
srcIPThe IP address of the device that initiated the connection
srcPort The source port used by the originating device
srcHost Name or ID of the computer where the detection occurred
srcMac The physical (MAC) address of the device that initiated the connection
srcUser Username of the account that ran the process responsible for the event
connID Connection ID
dataOrigin The service from which the logs originate (e.g., AWS CloudTrail). For the full list, please refer to Processing Data: Product Field Mappings
srcIDSource ID
labels Metadata
dataScopeA value that uniquely identifies the environment from which the data originates

HTTP

This type of telemetry captures HTTP request and response metadata, including headers, status codes, URL paths, and user-agent information, providing visibility into web traffic.

AlphaSOC can process HTTP data from Zeek.

AlphaSOC fieldDescription
url The HTTP request URL
method The HTTP request method
status The HTTP response status code
appThe application layer protocol used
actionSpecifies whether the event was allowed or denied
bytesInThe number of incoming bytes
bytesOutThe number of outgoing bytes
contentType The MIME type of the HTTP event payload
userAgent The user agent used in HTTP event
referrer The HTTP referer
tsThe associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
srcIPThe IP address of the device that initiated the connection
srcPortThe source port used by the originating device
srcHostName or ID of the computer where the detection occurred
srcMacThe physical (MAC) address of the device that initiated the connection
srcUser The username associated with the process that generated the event
dataOriginThe service from which the logs originate (e.g., AWS CloudTrail). For the full list, please refer to Processing Data: Product Field Mappings
srcIDSource ID
connIDConnection ID
labelsMetadata
dataScopeA value that uniquely identifies the environment from which the data originates

IP

This type of telemetry captures egress IPv4 and IPv6 connections to internet destinations, providing visibility into network communication.

AlphaSOC can process IP data from these sources: AWS VPC Flow, Zeek, GCP VPC Flow, Carbon Black Netconn, Crowdstrike FDR, Azure VNet Flow, Azure NSG Flow, Azure Device Network.

AlphaSOC fieldDescription
protoThe transport layer protocol used
bytesInThe number of incoming bytes
bytesOutThe number of outgoing bytes
packetsInThe number of incoming packets
packetsOutThe number of outgoing packets
appThe application layer protocol used
actionSpecifies whether the event was allowed or denied
durationThe duration of the connection
destIPThe IP address of the responding device
destPortThe destination port used by the responding device
tsThe associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
srcIPThe IP address of the device that initiated the connection
srcPortThe source port used by the originating device
srcHost Name or ID of the computer where the detection occurred
srcMac The physical (MAC) address of the device that initiated the connection
srcUserThe username associated with the process that generated the event
dataOriginThe service from which the logs originate (e.g., AWS CloudTrail). For the full list, please refer to Processing Data: Product Field Mappings
srcIDSource ID
connIDConnection ID
labels Metadata
dataScopeA value that uniquely identifies the environment from which the data originates

TLS

This type of telemetry captures TLS session details, including JA3 fingerprints and X.509 certificate information, providing insight into web traffic.

AlphaSOC can process TLS data from Zeek.

AlphaSOC fieldDescription
certHash Certificate fingerprint
issuer Organization that issued the certificate; issuer field in the certificate
subject The subject field in the certificate, identifying the entity to which the certificate was issued
validFromThe date and time when the certificate was issued
validToThe expiration date of the certificate
destIPThe IP address of the responding device
destPort The destination port used by the responding device
ja3Client's JA3 fingerprint
ja3s Server's JA3 fingerprint
ts The associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
srcIPThe IP address of the device that initiated the connection
srcPortThe source port used by the originating device
srcHostName or ID of the computer where the detection occurred
srcMacThe physical (MAC) address of the device that initiated the connection
srcUserThe username associated with the process that generated the event
dataOriginThe service from which the logs originate (e.g., AWS CloudTrail). For the full list, please refer to Processing Data: Product Field Mappings
srcIDSource ID
connIDConnection ID
labelsMetadata
dataScopeA value that uniquely identifies the environment from which the data originates

Audit

Audit logs are records of actions and events within an organization's software infrastructure. Log entries include details about what occurred, when it happened, who initiated it, which resources were affected, and any additional context relevant to the event.

In addition to the normalized fields specified in the tables below, AlphaSOC uses product-specific fields to analyze telemetry.

AWS CloudTrail

AlphaSOC can analyze AWS CloudTrail events to detect anomalies. To see query log examples, visit the AWS CloudTrail documentation.

AlphaSOC fieldDescription
ts The associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
srcIDSource ID
dataOrigin The service from which the logs originate (e.g., AWS CloudTrail). For the full list, please refer to Processing Data: Product Field Mappings
dataScopeA value that uniquely identifies the environment from which the data originates

GitHub

AlphaSOC can analyze GitHub audit logs to detect anomalies. To see a full list of GitHub audit log events, visit the GitHub documentation.

AlphaSOC fieldDescription
tsThe associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
srcIDSource ID
srcUserThe username associated with the process that generated the event
dataScopeA value that uniquely identifies the environment from which the data originates
callerIP The source IP address of the caller
userAgent The user agent associated with the caller
action Specifies whether the event was allowed or denied

Kubernetes

AlphaSOC can analyze Kubernetes cluster events to detect anomalies.

AlphaSOC fieldDescription
ts The associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
srcIDSource ID
callerIPThe source IP address of the incoming Kubernetes API request
userAgentThe user agent associated with the incoming Kubernetes API request
auditBodyThe name of the Kubernetes resource involved in the API request
codeThe HTTP status code returned by the Kubernetes API response
dataScopeA value that uniquely identifies the environment from which the data originates

Okta

AlphaSOC can analyze Okta System Logs to detect anomalies. To see a full list of Okta event types, visit the Okta documentation.

AlphaSOC fieldDescription
srcIDSource ID
srcUserThe username associated with the process that generated the event
userAgentThe user agent associated with the caller
tsThe associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
callerIPThe source IP address of the caller
actionOkta event type
resultSpecifies whether the event was allowed or denied

Slack

AlphaSOC can analyze Slack audit events to detect anomalies. To see query log example, visit the Slack API documentation.

AlphaSOC fieldDescription
srcIDSource ID
srcUserThe username associated with the process that generated the event
userAgentThe user agent associated with the caller
tsThe associated event time for the log is in the format: YYYY-MM-DDTHH:MM:SSZ
dataScopeA value that uniquely identifies the environment from which the data originates
callerIPThe source IP address of the caller
actionSpecifies whether the event was allowed or denied