{
"id": "alert-abc-123",
"rule_id": "rule-def-456",
"rule_title": "Failed Login Attempt",
"severity": "high",
"status": "new",
"created_at": "2024-01-15T14:32:17Z",
"acknowledged_at": null,
"resolved_at": null,
"acknowledged_by": null,
"resolved_by": null,
"matched_log": {
"@timestamp": "2024-01-15T14:32:15Z",
"event": {
"code": "4625",
"action": "logon-failed",
"outcome": "failure"
},
"source": {
"ip": "192.168.1.50",
"port": 52431
},
"user": {
"name": "admin",
"domain": "CORP"
},
"host": {
"name": "DC01",
"ip": ["10.0.0.5"]
},
"winlog": {
"event_id": 4625,
"channel": "Security"
}
},
"enrichment": {
"risk_level": "suspicious",
"risk_score": 65,
"iocs": [
{
"type": "ip",
"value": "192.168.1.50",
"sources": {
"abuseipdb": {
"is_public": true,
"abuse_confidence_score": 25,
"country_code": "US"
},
"greynoise": {
"noise": false,
"riot": false
}
}
}
],
"geoip": {
"source.ip": {
"country": "United States",
"city": "New York",
"asn": 12345,
"org": "Example ISP"
}
}
},
"tags": ["attack.credential_access", "attack.t1110"],
"comments": [
{
"id": "comment-xyz",
"user": "analyst@example.com",
"text": "Investigating - appears to be brute force attempt",
"created_at": "2024-01-15T15:00:00Z"
}
],
"related_alerts": [
{
"id": "alert-related-001",
"rule_title": "Successful Login After Failures",
"created_at": "2024-01-15T14:35:00Z"
}
]
}