Skip to main content

Product Field Mappings

AWS CloudTrail

AWS CloudTrail is a service that records actions taken by users, roles, or AWS services, capturing events from the AWS Management Console, AWS CLI, SDKs, and APIs. AlphaSOC processes AWS CloudTrail logs to identify potential threats based on these actions.

Learn how to enable AWS CloudTrail logging here.

Query log examples

To see query log examples, visit the AWS CloudTrail documentation.

Log field mapping

Data type: Audit

Data origin: aws-cloudtrail

AlphaSOC fieldLog fieldNotes
ideventID
ts eventTime
typeeventType
serviceeventSource
action eventName
region awsRegion
readOnly readOnly
ipsourceIPAddress
userAgent userAgent
srcIDrecipientAccountId aws/{recipientAccountId}
errorMessageerrorMessage
identityType userIdentity.type
identityARNuserIdentity.arn
accessKeyID userIdentity.accessKeyId
invokedByuserIdentity.invokedBy The name of the AWS service that made the request. This field should not be populated for user-initiated requests
identityUsername userIdentity.userName
ec2RoleDelivery userIdentity.sessionContext.ec2RoleDeliveryThis field is populated only when the temporary credentials are obtained from the AWS EC2 instance
bucketNamerequestParameters.bucketName
noMFAadditionalEventData.MFAUsed By default, this field is set to false, indicating that MFA is enabled or that no information is available regarding the MFA status
samlProviderARN additionalEventData.SamlProviderArn
dataScope recipientAccountId
awsRegion
recipientAccountId and awsRegion are mapped into the string format aws:{recipientAccountId}:{awsRegion}:
labelsrecipientAccountId
awsRegion
A key-value pair where aws/accountId is assigned the value of recipientAccountId, and aws/region is assigned the value of awsRegion

AWS Route 53

AWS Route 53 is a scalable DNS web service by Amazon that translates domain names into IP addresses. AlphaSOC processes AWS Route 53 logs to help you identify potential threats related to DNS activity.

Learn how to enable AWS Route 53 logging here.

Query log examples

To see query log examples, visit the AWS Route 53 documentation.

Log field mapping

Data type: DNS

Data origin: aws-route53

AlphaSOC fieldLog fieldNotes
tsquery_timestamp
srcIP srcaddr
srcPortsrcport
fqdnquery_name
qtypequery_type
rcode rcode
srcIDsrcids.instance
srcHost srcids.instance
dataScope account_id
region
vpc_id
account_id, region, and vpc_id are mapped into the string format aws:{account_id}:{region}:{vpc_id}
labels account_id
region
A key-value pair where aws/accountId is assigned the value of account_id, and aws/region is assigned the value of region

AWS VPC Flow

AWS Virtual Private Cloud (VPC) is a data collection feature that logs IP network traffic flow from the VPC, VPC subnet, or Elastic Network Interface (ENI). AlphaSOC processes AWS VPC Flow logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable AWS VPC Flow logging here.

Query log examples

To see query log examples, visit the VPC Flow log records.

Log field mapings

Data type: IP

Data origin: aws-vpc-flow

AlphaSOC fieldLog fieldNotes
tsstart
duration This field is based on the difference between the end and start timestamps
srcIPpkt-srcaddr
srcaddr
pkt-srcaddr takes priority over srcaddr
destIP pkt-dstaddr
dstaddr
pkt-dstaddr takes priority over dstaddr
srcPort srcport
destPort dstport
protoprotocol
packetsOut packets
srcHost instance-id
srcID instance-id
action action
bytesOutbytes
dataScope account-id
region
account_id and region are mapped into the string format aws:{account_id}:{region}

Azure Device Network

Azure Device Network is a data format used by Microsoft Defender to collect and store metadata about device network activity. AlphaSOC processes Azure Device Network logs to help analyze IP network and DNS traffic and identify potential threats.

Query log examples

To see query log fields, visit the Device Network documentation.

Log field mapings

Data type: IP, DNS

Data origin: azure-device-network

AlphaSOC fieldLog fieldNotes
tstimestamp
srcIPlocalIP
srcPortlocalPort
srcHostDeviceName
srcIDDeviceId
srcUserInitiatingProcessAccountUpn
fqdnRemoteUrl
destIPRemoteIP
destPortRemotePort
protoProtocol

Azure NSG Flow

Azure Network Security Group (NSG) Flow is a data collection feature that captures and logs metadata about network traffic processed by Network Security Groups (NSGs). AlphaSOC processes Azure NSG Flow logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable Azure NSG Flow logging here.

Query log examples

To see query log examples, visit the NSG Flow query results.

Log field mapings

Data type: IP

Data origin: azure-nsg-flow

AlphaSOC fieldLog fieldNotes
tstimestamp
srcIPsourceIP
destIPdestinationIP
srcPortsourcePort
destPortdestinationPort
protoprotocol
actiontrafficDecision
packetsOutpacketsSent
bytesOutbytesSent
packetsInpacketsReceived
bytesInbytesReceived
srcMacmac
macAddress
mac takes priority over macAddress
labelsresourceId

Azure VNet Flow

Azure Virtual Network (VNet) Flow is a data collection feature that captures and logs metadata about network traffic flowing through Network Security Groups (NSGs). AlphaSOC processes Azure VNet Flow logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable Azure VNet Flow logging here.

Query log examples

To see query log examples, visit the VNet Flow query results.

Log field mapings

Data type: IP

Data origin: azure-vnet-flow

AlphaSOC fieldLog fieldNotes
tstimestamp
srcIPsourceIP
destIPdestinationIP
srcPortsourcePort
destPortdestinationPort
protoprotocol
packetsOutpacketsSent
bytesOutbytesSent
packetsInpacketsReceived
bytesInbytesReceived
srcMacmac
macAddress
mac takes priority over macAddress
labelsflowLogResourceID

Carbon Black Netconn

Carbon Black Netconn is a feature within Carbon Black Endpoint Detection and Response (EDR), providing detailed information about network connections on endpoints. AlphaSOC processes Carbon Black Netconn data to help you analyze IP network traffic and identify potential threats.

Learn how to enable Carbon Black Netconn logging here.

Query log examples

To see query log examples, visit the Netconn log records.

Log field mapings

Data type: IP

Data origin: carbonblack-netconn

AlphaSOC fieldLog fieldNotes
tstimestamp
srcHostcomputer_name
direction This field is used to filter and process outbound traffic
fqdndomain
eventTypeevent_type
ja3ja3
ja3sja3s
srcIPlocal_ip
srcPortlocal_port
protoprotocol
destIPremote_ip
destPortremote_port

Crowdstrike FDR

Crowdstrike Falcon Data Replicator (FDR) is a data collection and replication feature that captures and logs metadata about network traffic collected by Crowdstrike Falcon. AlphaSOC processes Crowdstrike FDR logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable Crowdstrike FDR logging here.

Query log examples

To see query log examples, visit the Crowdstrike FDR documentation.

Log field mapings

Data type: IP, DNS

Data origin: crowdstrike-data

AlphaSOC fieldLog fieldNotes
tstimestamp
LogonTime
LogoffTime
Please refer to the note below
srcIDaid
srcHostClientComputerName
srcUserUserName
fqdnDomainName
qtypeRequestType
rcodeQueryStatus
srcIPLocalAddressIP4
LocalAddressIP6
LocalAddressIP4 takes priority over LocalAddressIP6
srcPortLocalPort
destIPRemoteAddressIP4
RemoteAddressIP6
RemoteAddressIP4 takes priority over RemoteAddressIP6
destPortRemotePort
protoProtocol

Log field names are determined by the EventName value:

  • DnsRequest, NetworkConnectIP4, and NetworkConnectIP6 events use timestamp.
  • UserLogon events use LogonTime.
  • UserLogoff events use LogoffTime.

Data origin: crowdstrike-aid-master

AlphaSOC fieldLog fieldNotes
tsTime
srcIDaid
srcHostComputerName

DNSTap

DNSTap is a data collection feature that captures and logs metadata about DNS traffic. AlphaSOC processes DNSTap logs to help you analyze DNS traffic and identify potential threats.

Learn how to enable DNSTap logging via CoreDNS here.

Query log examples

The queries conform to the standard DNS format.

Log field mapings

Data type: DNS

Data origin: dnstap

AlphaSOC fieldLog fieldNotes
tsquery_time_sec
query_time_nsec
Timestamp values, represented as separate seconds (query_time_sec) and nanoseconds (query_time_nsec), are combined and converted into a UTC
srcIPquery_address
srcPortquery_port
fqdnquery_name
qtypequery_type
rcodequery_rcode

The log fields names are derived directly from the Protocol Buffers definitions.

GCP Cloud DNS

GCP Cloud Domain Name System (DNS) is a service that captures and logs data related to DNS queries and responses. AlphaSOC processes GCP Cloud DNS logs to help you analyze DNS queries and responses and identify potential threats.

Learn how to enable GCP Cloud DNS logging here.

Query log examples

To see query log fields, visit the Cloud DNS query results.

Log field mapings

Data type: DNS

Data origin: gcp-dns

AlphaSOC fieldLog fieldNotes
tstimestamp
qtypequeryType
fqdnqueryName
srcIDvmInstanceName
vmInstanceIdString
VMInstanceIDString takes priority over vmInstanceName
rcoderesponseCode
srcIPsourceIP

GCP GKE

GCP Google Kubernetes Engine (GKE) enables audit logging capabilities, with the audit logs being captured and stored by Cloud Audit Logs. AlphaSOC processes GCP GKE audit logs to help you analyze them and identify potential threats.

Learn how to enable GCP GKE logging here.

Query log examples

To see query log examples, visit the GKE query results.

Log field mapings

Data type: Audit

Data origin: gcp-dns

AlphaSOC fieldLog fieldNotes
tstimestamp
srcIDprincipalEmail
callerIPcallerIp
userAgentcallerSuppliedUserAgent
auditBodyresourceName
methodName This field identifies accessed resources and actions performed
codecode
type This field is used to exclude log entries not associated with Kubernetes clusters
dataScopecluster_name
location
project_id
cluster_name, location, and project_id are mapped into the string format gcp:{cluster_name}"{location}:{project_id}

GCP VPC Flow

GCP Virtual Private Cloud (VPC) is a data collection feature that captures and logs metadata about network traffic flowing to and from virtual machine instances within a GCP VPC. AlphaSOC processes GCP VPC Flow logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable GCP VPC Flow logging here.

Query log examples

To see query log examples, visit the VPC Flow query results.

Log field mapings

Data type: IP

Data origin: gcp-vpc-flow

AlphaSOC fieldLog fieldNotes
bytesOutbytes_sent
packetsOutpackets_send
destIPdest_ip
destPortdest_port
protoprotocol
srcIPsrc_ip
srcPortsrc_port This field is used to filter and process outbound traffic from the VM to the internet
tsstart_time
durationThis field is based on the difference between the end and start timestamps
srcHostvm_name
project_id
Both values are used to determine the srcHost

Zeek

Zeek is an open-source network traffic analyzer. AlphaSOC processes Zeek logs for IP, DNS, HTTP, TLS, and DHCP activity to help identify potential threats.

Learn how to enable Zeek logging here.

Query log examples

To see query log examples, visit the Zeek documentation.

Log field mapping

Data type: IP

Data origin: zeek-conn

AlphaSOC fieldLog fieldNotes
tsts
timestamp
ts takes priority over timestamp
connID uid
srcIP id.orig_h
srcPortid.orig_p
destIPid.resp_h
destPortid.resp_p
protoproto
bytesIn orig_ip_bytes
bytesOutresp_ip_bytes
packetsInorig_pkts
packetsOutresp_pkts
appservice
durationduration
connStateconn_state New, open, closed, or unknown
connDirectionlocal_orig This field applies only to outbound connections

Data type: DHCP

Data origin: zeek-dhcp

AlphaSOC fieldLog fieldNotes
ts ts
timestamp
ts takes priority over timestamp
srcIP client_addr
srcMac mac
srcHost host_name
duration lease_time
type Type of lease

Data type: DNS

Data origin: zeek-dns

AlphaSOC fieldLog fieldNotes
ts ts
timestamp
ts takes priority over timestamp
connID uid
srcIP id.orig_h
srcPort id.orig_p
fqdn query
qtype qtype_name
rcode rcode_name

Data type: HTTP

Data origin: zeek-http

AlphaSOC fieldLog fieldNotes
tsts
timestamp
ts takes priority over timestamp
connIDuid
srcIPid.orig_h
srcPortid.orig_p
urlid.resp_p
host
uri
urlis constructed using id.resp_p, host, and uri. The host field is a required parameter for this field to be constructed
methodmethod
statusstatus_code
bytesInrequest_body_len
bytesOutresponse_body_len
contentTyperesp_mime_types The first occurring mime type
referrerreferrer
userAgentuser_agent

Data type: TLS

Data origin: zeek-ssl

AlphaSOC fieldLog fieldNotes
tsts
timestamp
ts takes priority over timestamp
connIDuid
srcIPid.orig_h
srcPortid.orig_p
destIPid.resp_h
destPortid.resp_p
ja3ja3
ja3sja3s
certHashcert_hash
issuerissuer
certificate_issuer
issuer takes priority over certificate_issuer
subject subject
certificate_subject
subject takes priority over certificate_subject