The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: UnexpectedError
Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
instruction string | input string | output string |
|---|---|---|
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.390+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132834.0",
"full_log": "ossec: File rotated (inode changed): '/var/log/nginx/apidev-access.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.431+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132834.383",
"full_log": "ossec: File rotated (inode changed): '/var/log/nginx/access.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.431+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132834.761",
"full_log": "ossec: File rotated (inode changed): '/var/log/nginx/apidev-error.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:43.678+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 4,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132843.1145",
"full_log": "ossec: File rotated (inode changed): '/var/log/apache2/error.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:43.678+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 5,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132843.1512",
"full_log": "ossec: File rotated (inode changed): '/var/log/apache2/access.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:01:48.257+0000",
"rule": {
"level": 3,
"description": "Host Unblocked by firewall-drop Active Response",
"id": "652",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132908.1880",
"full_log": "2025/03/05 00:01:47 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"delete\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-04T23:01:46.594+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":1,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"002\",\"name\":\"prod-server\",\"ip\":\"103.129.149.63\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741129306.34806896\",\"full_log\":\"147.185.132.31 - - [05/Mar/2025:06:01:45 +0700] \\\"GET / HTTP/1.1\\\" 404 118 \\\"-\\\" \\\"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"147.185.132.31\",\"id\":\"404\",\"url\":\"/\"},\"location\":\"/var/log/nginx/access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "delete",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-04T23:01:46.594+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "1",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "002",
"name": "prod-server",
"ip": "103.129.149.63"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741129306.34806896",
"full_log": "147.185.132.31 - - [05/Mar/2025:06:01:45 +0700] \"GET / HTTP/1.1\" 404 118 \"-\" \"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "147.185.132.31",
"id": "404",
"url": "/"
},
"location": "/var/log/nginx/access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 1,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.4897",
"full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:44",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 2,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:45",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.346+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5952",
"full_log": "2025/03/05 00:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":2,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:45\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "2",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:45",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.359+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.9221",
"full_log": "2025/03/05 00:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":1,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:44\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "1",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:44",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.596+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.12444",
"full_log": "2025/03/05 07:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":1,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:44\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "1",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:44",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.608+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 4,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.15660",
"full_log": "2025/03/05 07:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":2,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:45\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "2",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:45",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.341+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 1,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.18922",
"full_log": "8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \"GET /Kb8w HTTP/1.1\" 400 264 \"-\" \"Go-http-client/1.1\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "8.220.202.246",
"id": "400",
"url": "/Kb8w"
},
"location": "/var/log/nginx/apidev-access.log"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.342+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 2,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.19377",
"full_log": "8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \"GET /BHem HTTP/1.1\" 404 143 \"-\" \"Go-http-client/1.1\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "8.220.202.246",
"id": "404",
"url": "/BHem"
},
"location": "/var/log/nginx/apidev-access.log"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.362+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 5,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.19832",
"full_log": "2025/03/05 00:03:50 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:50.341+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":1,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"001\",\"name\":\"staging-environment\",\"ip\":\"10.184.0.2\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133030.18922\",\"full_log\":\"8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \\\"GET /Kb8w HTTP/1.1\\\" 400 264 \\\"-\\\" \\\"Go-http-client/1.1\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"8.220.202.246\",\"id\":\"400\",\"url\":\"/Kb8w\"},\"location\":\"/var/log/nginx/apidev-access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:50.341+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "1",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "001",
"name": "staging-environment",
"ip": "10.184.0.2"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.18922",
"full_log": "8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \"GET /Kb8w HTTP/1.1\" 400 264 \"-\" \"Go-http-client/1.1\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "8.220.202.246",
"id": "400",
"url": "/Kb8w"
},
"location": "/var/log/nginx/apidev-access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.480+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 6,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.22368",
"full_log": "2025/03/05 00:03:50 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:50.342+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":2,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"001\",\"name\":\"staging-environment\",\"ip\":\"10.184.0.2\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133030.19377\",\"full_log\":\"8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \\\"GET /BHem HTTP/1.1\\\" 404 143 \\\"-\\\" \\\"Go-http-client/1.1\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"8.220.202.246\",\"id\":\"404\",\"url\":\"/BHem\"},\"location\":\"/var/log/nginx/apidev-access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:50.342+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "2",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "001",
"name": "staging-environment",
"ip": "10.184.0.2"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.19377",
"full_log": "8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \"GET /BHem HTTP/1.1\" 404 143 \"-\" \"Go-http-client/1.1\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "8.220.202.246",
"id": "404",
"url": "/BHem"
},
"location": "/var/log/nginx/apidev-access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.303+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 4,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.24904",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.302+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 3,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.573+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 7,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25965",
"full_log": "2025/03/05 00:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.303+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":4,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:07:18.303+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "4",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.586+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 8,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.29245",
"full_log": "2025/03/05 00:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.302+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":3,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:07:18.302+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "3",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.797+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 9,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.32479",
"full_log": "2025/03/05 07:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.302+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":3,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:07:18.302+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "3",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.809+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 10,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.35705",
"full_log": "2025/03/05 07:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.303+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":4,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:07:18.303+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "4",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 6,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.38977",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 5,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.636+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 11,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.40048",
"full_log": "2025/03/05 00:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":5,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "5",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.650+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 12,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.43299",
"full_log": "2025/03/05 00:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":6,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "6",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.847+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 13,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.46596",
"full_log": "2025/03/05 07:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":5,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "5",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.859+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 14,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.49839",
"full_log": "2025/03/05 07:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":6,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "6",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.368+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 7,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53128",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.369+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 8,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.647+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 15,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.54189",
"full_log": "2025/03/05 00:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.369+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":8,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:26.369+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "8",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.661+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 16,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.57469",
"full_log": "2025/03/05 00:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.368+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":7,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:26.368+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "7",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.854+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 17,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.60703",
"full_log": "2025/03/05 07:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.368+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":7,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:26.368+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "7",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.866+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 18,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.63929",
"full_log": "2025/03/05 07:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.369+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":8,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:26.369+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "8",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 9,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67201",
"full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:30",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 10,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:29",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.714+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 19,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.68266",
"full_log": "2025/03/05 00:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":10,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:29\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "10",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:29",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.728+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 20,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.71510",
"full_log": "2025/03/05 00:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":9,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:30\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "9",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:30",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.914+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 21,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.74798",
"full_log": "2025/03/05 07:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":9,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:30\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "9",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:30",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.926+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 22,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.78078",
"full_log": "2025/03/05 07:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":10,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:29\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "10",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:29",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 12,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81314",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 11,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.755+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 23,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.82379",
"full_log": "2025/03/05 00:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":11,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "11",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.768+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 24,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.85666",
"full_log": "2025/03/05 00:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":12,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "12",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.946+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 25,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.88907",
"full_log": "2025/03/05 07:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":12,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "12",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.959+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 26,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.92140",
"full_log": "2025/03/05 07:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":11,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "11",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 13,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95419",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 14,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.778+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 27,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.96482",
"full_log": "2025/03/05 00:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":14,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "14",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.792+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 28,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.99768",
"full_log": "2025/03/05 00:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":13,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "13",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.971+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 29,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.103008",
"full_log": "2025/03/05 07:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":14,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "14",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Wazuh Alerts Dataset
π Overview
This dataset contains a collection of security alerts generated by the Wazuh SIEM/XDR platform. It captures various security events, including system audits, authentication failures, and potential intrusion attempts, making it an ideal resource for researchers and developers working on Security Operations Center (SOC) automation and Machine Learning for Cybersecurity.
ποΈ Dataset Details
- Author: Kholil Haq Alim Hakim
- Data Source: Live Wazuh Manager logs (Alerts.json)
- Format: JSON / Parquet
- Status: Curated Dataset
π― Intended Use
- Anomaly Detection: Training models to identify unusual patterns in security logs.
- Rule Validation: Testing and refining SIEM correlation rules.
- Dashboard Prototyping: Building visualizations for SOC analyst tools.
- Educational Purposes: Learning the structure of Wazuh alerts and OSSEC-based logging.
π Data Structure
The dataset follows the standard Wazuh alert schema. Key fields include:
| Field | Description |
|---|---|
timestamp |
UTC time of the generated alert |
rule.id |
The specific Wazuh rule ID triggered |
rule.level |
Severity level (1-15) |
rule.description |
Human-readable description of the security event |
agent.id |
Unique identifier of the monitored endpoint |
data |
Metadata containing source IP, usernames, or process IDs |
π οΈ How to Use
You can load this dataset directly using the Hugging Face datasets library:
from datasets import load_dataset
dataset = load_dataset("kholil-lil/wazuh-alerts")
print(dataset['train'][0])
π Citation & Attribution
If you use this dataset in a professional project or academic research, please cite it as follows:
APA Format
Hakim, K. H. A. (2025). Wazuh Alerts Dataset [Data set]. Hugging Face. https://huggingface.co/datasets/kholil-lil/wazuh-alerts
BibTeX Format
@misc{hakim_wazuh_2025,
author = {Hakim, Kholil Haq Alim},
title = {Wazuh Alerts Dataset},
year = {2025},
publisher = {Hugging Face},
howpublished = {\url{[https://huggingface.co/datasets/kholil-lil/wazuh-alerts](https://huggingface.co/datasets/kholil-lil/wazuh-alerts)}}
}
βοΈ License
This dataset is licensed under the MIT License. You are free to share, modify, and use the data for any purpose, provided that attribution is given to the author.
π§ Contact
- Maintainer: Kholil Haq Alim Hakim
- Location: Makassar, Indonesia
- Hugging Face: huggingface.co/kholil-lil
- Downloads last month
- 52