Alert export schema

The alert export schema for Corelight Investigator includes fields that provide comprehensive information for effective incident response and threat analysis.

This table summarizes the fields available in each of the four types of exported alerts.

Field Name

Description

Notice Alert

Suricata Alert

Machine Learning Alert

Search Based Alert

alert-to-detection-url

URL linking the alert to its detection in Corelight Investigator.

X

X

X

X

alert_entity

The primary entity involved in the alert (such as source or destination IP).

X

X

X

X

alert_id

Unique identifier for the alert.

X

X

X

X

alert_info

Contains metadata about the alert, such as name and type.

X

X

X

X

alert_keys

Identifiers linking the alert to a tenant or other Corelight components.

X

X

X

X

alert_timestamp

Timestamps indicating when the alert was observed, started, or ended.

X

X

X

X

event_ids

List of event IDs related to the alert.

X

X

X

X

false_positive

Indicates if the alert is marked as a false positive and the result incorrectly indicates the presence of a condition..

X

X

X

X

related_alert_entities

Entities related to the alert, such as additional source or destination IPs.

X

X

X

X

score

Numerical score indicating the severity or priority of the alert.

X

X

X

X

severity

Severity level of the alert.

X

X

X

X

mitre_tactics

MITRE ATT&CK tactics associated with the alert.

X

X

X

mitre_techniques

MITRE ATT&CK techniques associated with the alert.

X

X

X

notice

Details specific to notice alerts, such as actions and network paths.

X

suricata_corelight

Details specific to Suricata alerts, including flow data and signatures.

X

ml

Details specific to machine learning alerts, such as model information.

X

related_entities

Broader entities related to the alert, often overlapping with related_alert_entities.

X

X

X

X

Examples of alert exports

Here are samples of an alert export for each alert type.

Notice alert

{
   "alert-to-detection-url":"https://eu.investigator.corelight.com/alert-to-detection/33e745e6-77da-4849-b0f7-a378875cc514",
   "alert_entity":{
      "entity_category":"source",
      "entity_id":"IP10.0.2.16",
      "entity_name":"10.0.2.16",
      "entity_type":"IP"
   },
   "alert_id":"33e745e6-77da-4849-b0f7-a378875cc514",
   "alert_info":{
      "alert_name":"DGA::Infected_Host_Activity",
      "alert_type":"notice",
      "content_id":"DGA::Infected_Host_Activity"
   },
   "alert_keys":{
      "tenant":"terrific",
      "tenant_alert":"f7e51be65a3650494a04f6ed45b8a2bb",
      "tenant_alert_entity":"9020cb47ef7d6621089365f2c92cd51a",
      "tenant_entity":"72c06dcc8b62f7a46158d65b5ed2a47e"
   },
   "alert_timestamp":{
      "end":1734563066,
      "observed":1734563066,
      "start":1734563066,
      "ttl":1742339066
   },
   "event_ids":[
      "55ce958f67fc80643a2d271c64c179a4"
   ],
   "false_positive":false,
   "mitre_tactics":[
      "Command and Control"
   ],
   "mitre_techniques":[
      "Command and Control :: Dynamic Resolution"
   ],
   "notice":{
      "actions":[
         "Notice::ACTION_LOG"
      ],
      "destination_ip":"142.111.199.16",
      "dropped":null,
      "dst":"142.111.199.16",
      "file_desc":null,
      "file_mime_type":null,
      "fuid":null,
      "msg":"Infected host 10.0.2.16 is communicating with IP resolved from DGA domain.",
      "n":null,
      "note":"DGA::Infected_Host_Activity",
      "orig_h":"10.0.2.16",
      "orig_p":49179,
      "p":80,
      "path":"notice",
      "peer_descr":"worker-01",
      "proto":"tcp",
      "remote_location":null,
      "resp_h":"142.111.199.16",
      "resp_p":80,
      "severity_info":{
         "level":1,
         "name":"alert"
      },
      "source_ip":"10.0.2.16",
      "src":"10.0.2.16",
      "sub":null,
      "suppress_for":3600.0,
      "system_name":"LABSensor2",
      "uid":"Cv6ZNV28wwt3SoLS3d"
   },
   "related_alert_entities":[
      {
         "entity_category":"source",
         "entity_id":"IP10.0.2.16",
         "entity_name":"10.0.2.16",
         "entity_type":"IP"
      },
      {
         "entity_category":"destination",
         "entity_id":"IP142.111.199.16",
         "entity_name":"142.111.199.16",
         "entity_type":"IP"
      }
   ],
   "related_entities":[
      {
         "entity_category":"source",
         "entity_id":"IP10.0.2.16",
         "entity_name":"10.0.2.16",
         "entity_type":"IP"
      },
      {
         "entity_category":"destination",
         "entity_id":"IP142.111.199.16",
         "entity_name":"142.111.199.16",
         "entity_type":"IP"
      }
   ],
   "score":9,
   "severity":1,
   "tenant":"terrific"
}

Suricata alert

{
"alert-to-detection-url": "https://test.investigator.corelight.io/alert-to-detection/5514438b726a6606d9ec014598afb59e",
"alert_entity": {
   "entity_id": "IP10.2.128.198",
   "entity_name": "10.2.128.198",
   "entity_type": "IP"
},
"alert_id": "5514438b726a6606d9ec014598afb59e",
"alert_info": {
   "alert_name": "ETPRO MALWARE Variant.Zusy.71154 Checkin 2",
   "alert_type": "suricata_corelight",
   "content_id": "SURI-2807246"
},
"alert_keys": {
   "tenant": "major",
   "tenant_alert": "88c00c3762303b3c439100395005fd0c",
   "tenant_alert_entity": "4cfff92a42a9d7f3b300e2fb13815aa0",
   "tenant_entity": "bc6a24af3853626e360636dfc8ac4999"
},
"alert_timestamp": {
   "end": 1689318425,
   "observed": 1689318425,
   "start": 1689318425,
   "ttl": 1697094425
},
"event_ids": [
   "5514438b726a6606d9ec014598afb59e"
],
"false_positive": false,
"related_entities": [
   {
      "entity_id": "IP10.2.128.198",
      "entity_name": "10.2.128.198",
      "entity_type": "IP"
   },
   {
      "entity_id": "IP15.197.142.173",
      "entity_name": "15.197.142.173",
      "entity_type": "IP"
   }
],
"score": 2,
"severity": 1,
"suricata_corelight": {
   "action": "allowed",
   "category": "Malware Command and Control Activity Detected",
   "community_id": "1:HRr0NqdrDQ0Dr1I9RpE7Br2CRso=",
   "destination_ip": "15.197.142.173",
   "destination_port": 80,
   "flow_id": "1281016746003869",
   "gid": 1,
   "metadata": [
      {
      "key": "created_at",
      "val": "2013_11_22"
      },
      {
      "key": "former_category",
      "val": "MALWARE"
      },
      {
      "key": "updated_at",
      "val": "2020_04_27"
      }
   ],
   "pcap_cnt": 0,
   "rev": null,
   "service": "http",
   "signature_id": 2807246,
   "source_ip": "10.2.128.198",
   "source_port": 40988,
   "suri_id": "S1GbNMxbhlR9",
   "tx_id": 0,
   "uid": "CWd35y31qX5yOOcJx3"
},
"tenant": "major"
}

Machine learning alert

{
"alert-to-detection-url":"https://eu.investigator.corelight.com/alert-to-detection/3647e185-c925-4126-8062-18bec752552a",
   "alert_entity":{
      "entity_category":"destination",
      "entity_id":"DOMAINxn--googl-r51b.com[googlẹ.com]",
      "entity_name":"xn--googl-r51b.com[googlẹ.com]",
      "entity_type":"DOMAIN"
   },
   "alert_id":"3647e185-c925-4126-8062-18bec752552a",
   "alert_info":{
      "alert_name":"IDN Homograph",
      "alert_type":"ml",
      "content_id":"d5b300c4-66d1-4c24-9736-c85137902824"
   },
   "alert_keys":{
      "tenant":"terrific",
      "tenant_alert":"f696a63546dfc26301366393c780cea4",
      "tenant_alert_entity":"2c46a8222cf3a7341c8a550231549b3c",
      "tenant_entity":"96346facbc53e59d3efb115b71f7ae6d"
   },
   "alert_timestamp":{
      "end":1734559440,
      "observed":1734559440,
      "start":1734559440,
      "ttl":1742335440
   },
   "event_ids":[
      "fc228800-bd8b-11ef-9075-378201d6ce2c"
   ],
   "false_positive":false,
   "mitre_tactics":[
      "Initial Access"
   ],
   "mitre_techniques":[
      "Initial Access :: Phishing"
   ],
   "ml":{
      "average_technique_score_map":{

      },
      "description":"",
      "mode":"realtime",
      "models":[
         {
            "features":[
               {
                  "actual":6,
                  "contribution":0.0,
                  "difference":-0.5213735317702346,
                  "feature_name":"sld_length"
               },
               {
                  "actual":0.4,
                  "contribution":0.04174114181132976,
                  "difference":0.31983600917002475,
                  "feature_name":"ratio_sld_vowel"
               },
               {
                  "actual":0.6,
                  "contribution":0.041046442279209526,
                  "difference":-0.19449521426947136,
                  "feature_name":"ratio_sld_consonant"
               },
               {
                  "actual":1.5,
                  "contribution":0.03940034636389447,
                  "difference":-0.4171832415591669,
                  "feature_name":"ratio_sld_consonant_vowel"
               },
               {
                  "actual":0.0,
                  "contribution":0.035030980647851276,
                  "difference":-0.18543056603275107,
                  "feature_name":"ratio_sld_digit"
               },
               {
                  "actual":0.0,
                  "contribution":0.04039587255667663,
                  "difference":-0.13415568274840564,
                  "feature_name":"ratio_sld_hyphen"
               },
               {
                  "actual":0.47,
                  "contribution":0.04003574143266214,
                  "difference":1.0622479614257772,
                  "feature_name":"frequency_tld"
               },
               {
                  "actual":531330261,
                  "contribution":0.05728694097426741,
                  "difference":0.404680346265946,
                  "feature_name":"alexa_rank"
               },
               {
                  "actual":1,
                  "contribution":0.08520089431041751,
                  "difference":0.596238145178608,
                  "feature_name":"flag_internationalized_domain"
               },
               {
                  "actual":0.9997,
                  "contribution":0.6198616396236913,
                  "difference":2.0013104356457436,
                  "feature_name":"idn_homograph_score"
               }
            ],
            "model_alias":[
               "IDN Homograph Realtime Classifier v1"
            ],
            "model_name":"domain-homograph_domain_class_realtime_v001",
            "model_score":100.0,
            "predicted_tag_id":"d5b300c4-66d1-4c24-9736-c85137902824"
         }
      ],
      "pipeline":"domain",
      "status":"malicious",
      "tag_id":"d5b300c4-66d1-4c24-9736-c85137902824",
      "user_tag":{

      },
      "whitelisted_info":[

      ]
   },
   "related_alert_entities":[
      {
         "entity_category":"destination",
         "entity_id":"DOMAINxn--googl-r51b.com[googlẹ.com]",
         "entity_name":"xn--googl-r51b.com[googlẹ.com]",
         "entity_type":"DOMAIN"
      }
   ],
   "related_entities":[
      {
         "entity_category":"destination",
         "entity_id":"DOMAINxn--googl-r51b.com[googlẹ.com]",
         "entity_name":"xn--googl-r51b.com[googlẹ.com]",
         "entity_type":"DOMAIN"
      }
   ],
   "score":5,
   "severity":55,
   "tenant":"terrific"
}

Search-based alert

{
   "alert-to-detection-url":"https://investigator.corelight.io/alert-to-detection/0614f098-486a-4245-b03b-866a2c2cf23b",
   "alert_entity":{
      "entity_category":"source",
      "entity_id":"IP10.102.84.70",
      "entity_name":"10.102.84.70",
      "entity_type":"IP"
   },
   "alert_id":"0614f098-486a-4245-b03b-866a2c2cf23b",
   "alert_info":{
      "alert_name":"Proxy Not Shell",
      "alert_type":"custom_search_rule",
      "content_id":"86c04082-5830-4446-ad10-a2aa2258d8a6"
   },
   "alert_keys":{
      "tenant":"major",
      "tenant_alert":"613997110ec8c1e0050fe2a641c9123c",
      "tenant_alert_entity":"d0ebac49a476ccffed1262acb948371c",
      "tenant_entity":"09252be624dc063142d922189b1ab032"
   },
   "alert_timestamp":{
      "end":1734992816,
      "observed":1734992816,
      "start":1734992816,
      "ttl":1742768816
   },
   "event_ids":[
      "df821593158305a3bed62b94eeb1ee4d"
   ],
   "false_positive":false,
   "mitre_tactics":[
      "Initial Access"
   ],
   "mitre_techniques":[
      "Initial Access :: Exploit Public-Facing Application"
   ],
   "related_alert_entities":[
      {
         "entity_category":"destination",
         "entity_id":"IP192.168.0.114",
         "entity_name":"192.168.0.114",
         "entity_type":"IP"
      },
      {
         "entity_category":"source",
         "entity_id":"IP10.102.84.70",
         "entity_name":"10.102.84.70",
         "entity_type":"IP"
      }
   ],
   "related_entities":[
      {
         "entity_category":"destination",
         "entity_id":"IP192.168.0.114",
         "entity_name":"192.168.0.114",
         "entity_type":"IP"
      },
      {
         "entity_category":"source",
         "entity_id":"IP10.102.84.70",
         "entity_name":"10.102.84.70",
         "entity_type":"IP"
      }
   ],
   "score":10,
   "severity":0,
   "tenant":"major"
}