Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Couldn't reach 'kholil-lil/wazuh-alerts' on the Hub (LocalEntryNotFoundError)
Error code:   UnexpectedError

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

instruction
string
input
string
output
string
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.390+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 1, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ "II_5.1.f", "IV_35.7.d" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.9" ], "tsc": [ "CC6.1", "CC7.2", "CC7.3", "PI1.4", "PI1.5", "CC7.1", "CC8.1" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741132834.0", "full_log": "ossec: File rotated (inode changed): '/var/log/nginx/apidev-access.log'.", "decoder": { "name": "ossec" }, "location": "logcollector" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.431+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 2, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ "II_5.1.f", "IV_35.7.d" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.9" ], "tsc": [ "CC6.1", "CC7.2", "CC7.3", "PI1.4", "PI1.5", "CC7.1", "CC8.1" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741132834.383", "full_log": "ossec: File rotated (inode changed): '/var/log/nginx/access.log'.", "decoder": { "name": "ossec" }, "location": "logcollector" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.431+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 3, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ "II_5.1.f", "IV_35.7.d" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.9" ], "tsc": [ "CC6.1", "CC7.2", "CC7.3", "PI1.4", "PI1.5", "CC7.1", "CC8.1" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741132834.761", "full_log": "ossec: File rotated (inode changed): '/var/log/nginx/apidev-error.log'.", "decoder": { "name": "ossec" }, "location": "logcollector" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:43.678+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 4, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ "II_5.1.f", "IV_35.7.d" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.9" ], "tsc": [ "CC6.1", "CC7.2", "CC7.3", "PI1.4", "PI1.5", "CC7.1", "CC8.1" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741132843.1145", "full_log": "ossec: File rotated (inode changed): '/var/log/apache2/error.log'.", "decoder": { "name": "ossec" }, "location": "logcollector" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:43.678+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 5, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ "II_5.1.f", "IV_35.7.d" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.9" ], "tsc": [ "CC6.1", "CC7.2", "CC7.3", "PI1.4", "PI1.5", "CC7.1", "CC8.1" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741132843.1512", "full_log": "ossec: File rotated (inode changed): '/var/log/apache2/access.log'.", "decoder": { "name": "ossec" }, "location": "logcollector" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:01:48.257+0000", "rule": { "level": 3, "description": "Host Unblocked by firewall-drop Active Response", "id": "652", "firedtimes": 1, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741132908.1880", "full_log": "2025/03/05 00:01:47 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"delete\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-04T23:01:46.594+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":1,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"002\",\"name\":\"prod-server\",\"ip\":\"103.129.149.63\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741129306.34806896\",\"full_log\":\"147.185.132.31 - - [05/Mar/2025:06:01:45 +0700] \\\"GET / HTTP/1.1\\\" 404 118 \\\"-\\\" \\\"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"147.185.132.31\",\"id\":\"404\",\"url\":\"/\"},\"location\":\"/var/log/nginx/access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "delete", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-04T23:01:46.594+0000", "rule": { "level": "5", "description": "Web server 400 error code.", "id": "31101", "firedtimes": "1", "mail": "false", "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SA.11", "SI.4" ], "tsc": [ "CC6.6", "CC7.1", "CC8.1", "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "002", "name": "prod-server", "ip": "103.129.149.63" }, "manager": { "name": "wazuh-server" }, "id": "1741129306.34806896", "full_log": "147.185.132.31 - - [05/Mar/2025:06:01:45 +0700] \"GET / HTTP/1.1\" 404 118 \"-\" \"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com\"", "decoder": { "name": "web-accesslog" }, "data": { "protocol": "GET", "srcip": "147.185.132.31", "id": "404", "url": "/" }, "location": "/var/log/nginx/access.log" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 1, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.4897", "full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:03:44", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "47838", "srcuser": "me" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 2, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.5413", "full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:03:45", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "47838", "srcuser": "me" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.346+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 1, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.5952", "full_log": "2025/03/05 00:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":2,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:45\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "2", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.5413", "full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:03:45", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "47838", "srcuser": "me" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.359+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 2, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.9221", "full_log": "2025/03/05 00:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":1,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:44\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "1", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.5413", "full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:03:44", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "47838", "srcuser": "me" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.596+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 3, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.12444", "full_log": "2025/03/05 07:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":1,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:44\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "1", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.5413", "full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:03:44", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "47838", "srcuser": "me" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.608+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 4, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.15660", "full_log": "2025/03/05 07:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":2,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:45\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "2", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133026.5413", "full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:03:45", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "47838", "srcuser": "me" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.341+0000", "rule": { "level": 5, "description": "Web server 400 error code.", "id": "31101", "firedtimes": 1, "mail": false, "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SA.11", "SI.4" ], "tsc": [ "CC6.6", "CC7.1", "CC8.1", "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133030.18922", "full_log": "8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \"GET /Kb8w HTTP/1.1\" 400 264 \"-\" \"Go-http-client/1.1\"", "decoder": { "name": "web-accesslog" }, "data": { "protocol": "GET", "srcip": "8.220.202.246", "id": "400", "url": "/Kb8w" }, "location": "/var/log/nginx/apidev-access.log" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.342+0000", "rule": { "level": 5, "description": "Web server 400 error code.", "id": "31101", "firedtimes": 2, "mail": false, "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SA.11", "SI.4" ], "tsc": [ "CC6.6", "CC7.1", "CC8.1", "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133030.19377", "full_log": "8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \"GET /BHem HTTP/1.1\" 404 143 \"-\" \"Go-http-client/1.1\"", "decoder": { "name": "web-accesslog" }, "data": { "protocol": "GET", "srcip": "8.220.202.246", "id": "404", "url": "/BHem" }, "location": "/var/log/nginx/apidev-access.log" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.362+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 5, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133030.19832", "full_log": "2025/03/05 00:03:50 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:50.341+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":1,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"001\",\"name\":\"staging-environment\",\"ip\":\"10.184.0.2\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133030.18922\",\"full_log\":\"8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \\\"GET /Kb8w HTTP/1.1\\\" 400 264 \\\"-\\\" \\\"Go-http-client/1.1\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"8.220.202.246\",\"id\":\"400\",\"url\":\"/Kb8w\"},\"location\":\"/var/log/nginx/apidev-access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:03:50.341+0000", "rule": { "level": "5", "description": "Web server 400 error code.", "id": "31101", "firedtimes": "1", "mail": "false", "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SA.11", "SI.4" ], "tsc": [ "CC6.6", "CC7.1", "CC8.1", "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "001", "name": "staging-environment", "ip": "10.184.0.2" }, "manager": { "name": "wazuh-server" }, "id": "1741133030.18922", "full_log": "8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \"GET /Kb8w HTTP/1.1\" 400 264 \"-\" \"Go-http-client/1.1\"", "decoder": { "name": "web-accesslog" }, "data": { "protocol": "GET", "srcip": "8.220.202.246", "id": "400", "url": "/Kb8w" }, "location": "/var/log/nginx/apidev-access.log" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.480+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 6, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133030.22368", "full_log": "2025/03/05 00:03:50 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:50.342+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":2,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"001\",\"name\":\"staging-environment\",\"ip\":\"10.184.0.2\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133030.19377\",\"full_log\":\"8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \\\"GET /BHem HTTP/1.1\\\" 404 143 \\\"-\\\" \\\"Go-http-client/1.1\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"8.220.202.246\",\"id\":\"404\",\"url\":\"/BHem\"},\"location\":\"/var/log/nginx/apidev-access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:03:50.342+0000", "rule": { "level": "5", "description": "Web server 400 error code.", "id": "31101", "firedtimes": "2", "mail": "false", "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SA.11", "SI.4" ], "tsc": [ "CC6.6", "CC7.1", "CC8.1", "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "001", "name": "staging-environment", "ip": "10.184.0.2" }, "manager": { "name": "wazuh-server" }, "id": "1741133030.19377", "full_log": "8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \"GET /BHem HTTP/1.1\" 404 143 \"-\" \"Go-http-client/1.1\"", "decoder": { "name": "web-accesslog" }, "data": { "protocol": "GET", "srcip": "8.220.202.246", "id": "404", "url": "/BHem" }, "location": "/var/log/nginx/apidev-access.log" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.303+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 4, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.24904", "full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:07:16", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "36574", "srcuser": "yuan" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.302+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 3, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.25446", "full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:07:16", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "36574", "srcuser": "yuan" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.573+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 7, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.25965", "full_log": "2025/03/05 00:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.303+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":4,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:07:18.303+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "4", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.25446", "full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:07:16", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "36574", "srcuser": "yuan" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.586+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 8, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.29245", "full_log": "2025/03/05 00:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.302+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":3,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:07:18.302+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "3", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.25446", "full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:07:16", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "36574", "srcuser": "yuan" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.797+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 9, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.32479", "full_log": "2025/03/05 07:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.302+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":3,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:07:18.302+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "3", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.25446", "full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:07:16", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "36574", "srcuser": "yuan" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.809+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 10, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.35705", "full_log": "2025/03/05 07:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.303+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":4,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:07:18.303+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "4", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133238.25446", "full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:07:16", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "36574", "srcuser": "yuan" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 6, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.38977", "full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:15", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "36986", "srcuser": "suporte" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 5, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.39524", "full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:15", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "36986", "srcuser": "suporte" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.636+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 11, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.40048", "full_log": "2025/03/05 00:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":5,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "116.193.190.42", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "5", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.39524", "full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:15", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "36986", "srcuser": "suporte" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.650+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 12, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.43299", "full_log": "2025/03/05 00:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":6,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "116.193.190.42", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "6", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.39524", "full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:15", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "36986", "srcuser": "suporte" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.847+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 13, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.46596", "full_log": "2025/03/05 07:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":5,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "116.193.190.42", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "5", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.39524", "full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:15", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "36986", "srcuser": "suporte" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.859+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 14, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.49839", "full_log": "2025/03/05 07:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":6,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "116.193.190.42", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "6", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133296.39524", "full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:15", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "36986", "srcuser": "suporte" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.368+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 7, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.53128", "full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:24", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "60916", "srcuser": "luis" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.369+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 8, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.53647", "full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:24", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "60916", "srcuser": "luis" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.647+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 15, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.54189", "full_log": "2025/03/05 00:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.369+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":8,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:08:26.369+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "8", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.53647", "full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:24", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "60916", "srcuser": "luis" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.661+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 16, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.57469", "full_log": "2025/03/05 00:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.368+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":7,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:08:26.368+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "7", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.53647", "full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:24", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "60916", "srcuser": "luis" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.854+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 17, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.60703", "full_log": "2025/03/05 07:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.368+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":7,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:08:26.368+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "7", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.53647", "full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:24", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "60916", "srcuser": "luis" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.866+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 18, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.63929", "full_log": "2025/03/05 07:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.369+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":8,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:08:26.369+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "8", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133306.53647", "full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:08:24", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "60916", "srcuser": "luis" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 9, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.67201", "full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:09:30", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "57026", "srcuser": "redbot" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 10, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.67745", "full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:09:29", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "57026", "srcuser": "redbot" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.714+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 19, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.68266", "full_log": "2025/03/05 00:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":10,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:29\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "10", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.67745", "full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:09:29", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "57026", "srcuser": "redbot" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.728+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 20, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.71510", "full_log": "2025/03/05 00:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":9,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:30\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "9", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.67745", "full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:09:30", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "57026", "srcuser": "redbot" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.914+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 21, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.74798", "full_log": "2025/03/05 07:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":9,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:30\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "9", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.67745", "full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:09:30", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "57026", "srcuser": "redbot" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.926+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 22, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.78078", "full_log": "2025/03/05 07:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":10,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:29\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "10", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133370.67745", "full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:09:29", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "57026", "srcuser": "redbot" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 12, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.81314", "full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:07", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "37810", "srcuser": "temp" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 11, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.81835", "full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:07", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "37810", "srcuser": "temp" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.755+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 23, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.82379", "full_log": "2025/03/05 00:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":11,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "116.193.190.42", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "11", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.81835", "full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:07", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "37810", "srcuser": "temp" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.768+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 24, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.85666", "full_log": "2025/03/05 00:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":12,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "116.193.190.42", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "12", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.81835", "full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:07", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "37810", "srcuser": "temp" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.946+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 25, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.88907", "full_log": "2025/03/05 07:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":12,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "116.193.190.42", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "12", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.81835", "full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:07", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "37810", "srcuser": "temp" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.959+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 26, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.92140", "full_log": "2025/03/05 07:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":11,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "116.193.190.42", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "11", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133408.81835", "full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:07", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "116.193.190.42", "srcport": "37810", "srcuser": "temp" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 13, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133434.95419", "full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:33", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "53136", "srcuser": "smart" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": 14, "mail": false, "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133434.95939", "full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:33", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "53136", "srcuser": "smart" }, "location": "journald" }
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.778+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 27, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133434.96482", "full_log": "2025/03/05 00:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":14,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "14", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133434.95939", "full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:33", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "53136", "srcuser": "smart" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.792+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 28, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133434.99768", "full_log": "2025/03/05 00:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":13,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "13", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133434.95939", "full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:33", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "53136", "srcuser": "smart" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.971+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 29, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ "4.13" ], "gdpr": [ "IV_35.7.d" ], "nist_800_53": [ "SI.4" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3", "CC7.4" ] }, "agent": { "id": "xxx", "name": "xxx", "ip": "xxx.xxx.xxx.xxx" }, "manager": { "name": "wazuh-server" }, "id": "1741133434.103008", "full_log": "2025/03/05 07:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":14,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}", "decoder": { "parent": "ar_log_json", "name": "ar_log_json" }, "data": { "srcip": "45.55.159.241", "version": "1", "origin": { "name": "node01", "module": "wazuh-execd" }, "command": "add", "parameters": { "extra_args": [], "alert": { "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": "5", "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ], "technique": [ "Password Guessing", "SSH" ] }, "firedtimes": "14", "mail": "false", "groups": [ "syslog", "sshd", "authentication_failed", "invalid_login" ], "gdpr": [ "IV_35.7.d", "IV_32.2" ], "gpg13": [ "7.1" ], "hipaa": [ "164.312.b" ], "nist_800_53": [ "AU.14", "AC.7", "AU.6" ], "pci_dss": [ "10.2.4", "10.2.5", "10.6.1" ], "tsc": [ "CC6.1", "CC6.8", "CC7.2", "CC7.3" ] }, "agent": { "id": "000", "name": "wazuh-server" }, "manager": { "name": "wazuh-server" }, "id": "1741133434.95939", "full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]", "predecoder": { "program_name": "sshd", "timestamp": "Mar 05 00:10:33", "hostname": "wazuh-server" }, "decoder": { "parent": "sshd", "name": "sshd" }, "data": { "srcip": "45.55.159.241", "srcport": "53136", "srcuser": "smart" }, "location": "journald" }, "program": "active-response/bin/firewall-drop" } }, "location": "/var/ossec/logs/active-responses.log" }
False Positive
End of preview.

Wazuh Alerts Dataset

πŸ“Œ Overview

This dataset contains a collection of security alerts generated by the Wazuh SIEM/XDR platform. It captures various security events, including system audits, authentication failures, and potential intrusion attempts, making it an ideal resource for researchers and developers working on Security Operations Center (SOC) automation and Machine Learning for Cybersecurity.

πŸ—‚οΈ Dataset Details

  • Author: Kholil Haq Alim Hakim
  • Data Source: Live Wazuh Manager logs (Alerts.json)
  • Format: JSON / Parquet
  • Status: Curated Dataset

🎯 Intended Use

  • Anomaly Detection: Training models to identify unusual patterns in security logs.
  • Rule Validation: Testing and refining SIEM correlation rules.
  • Dashboard Prototyping: Building visualizations for SOC analyst tools.
  • Educational Purposes: Learning the structure of Wazuh alerts and OSSEC-based logging.

πŸ“Š Data Structure

The dataset follows the standard Wazuh alert schema. Key fields include:

Field Description
timestamp UTC time of the generated alert
rule.id The specific Wazuh rule ID triggered
rule.level Severity level (1-15)
rule.description Human-readable description of the security event
agent.id Unique identifier of the monitored endpoint
data Metadata containing source IP, usernames, or process IDs

πŸ› οΈ How to Use

You can load this dataset directly using the Hugging Face datasets library:

from datasets import load_dataset

dataset = load_dataset("kholil-lil/wazuh-alerts")
print(dataset['train'][0])

πŸ“œ Citation & Attribution

If you use this dataset in a professional project or academic research, please cite it as follows:

APA Format

Hakim, K. H. A. (2025). Wazuh Alerts Dataset [Data set]. Hugging Face. https://huggingface.co/datasets/kholil-lil/wazuh-alerts

BibTeX Format

@misc{hakim_wazuh_2025,
  author = {Hakim, Kholil Haq Alim},
  title = {Wazuh Alerts Dataset},
  year = {2025},
  publisher = {Hugging Face},
  howpublished = {\url{[https://huggingface.co/datasets/kholil-lil/wazuh-alerts](https://huggingface.co/datasets/kholil-lil/wazuh-alerts)}}
}

βš–οΈ License

This dataset is licensed under the MIT License. You are free to share, modify, and use the data for any purpose, provided that attribution is given to the author.

πŸ“§ Contact

Downloads last month
52