instruction stringclasses 1
value | input stringlengths 537 4.51k | output stringclasses 2
values |
|---|---|---|
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.390+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132834.0",
"full_log": "ossec: File rotated (inode changed): '/var/log/nginx/apidev-access.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.431+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132834.383",
"full_log": "ossec: File rotated (inode changed): '/var/log/nginx/access.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.431+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132834.761",
"full_log": "ossec: File rotated (inode changed): '/var/log/nginx/apidev-error.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:43.678+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 4,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132843.1145",
"full_log": "ossec: File rotated (inode changed): '/var/log/apache2/error.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:43.678+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 5,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
"II_5.1.f",
"IV_35.7.d"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.9"
],
"tsc": [
"CC6.1",
"CC7.2",
"CC7.3",
"PI1.4",
"PI1.5",
"CC7.1",
"CC8.1"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132843.1512",
"full_log": "ossec: File rotated (inode changed): '/var/log/apache2/access.log'.",
"decoder": {
"name": "ossec"
},
"location": "logcollector"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:01:48.257+0000",
"rule": {
"level": 3,
"description": "Host Unblocked by firewall-drop Active Response",
"id": "652",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741132908.1880",
"full_log": "2025/03/05 00:01:47 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"delete\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-04T23:01:46.594+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":1,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"002\",\"name\":\"prod-server\",\"ip\":\"103.129.149.63\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741129306.34806896\",\"full_log\":\"147.185.132.31 - - [05/Mar/2025:06:01:45 +0700] \\\"GET / HTTP/1.1\\\" 404 118 \\\"-\\\" \\\"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"147.185.132.31\",\"id\":\"404\",\"url\":\"/\"},\"location\":\"/var/log/nginx/access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "delete",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-04T23:01:46.594+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "1",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "002",
"name": "prod-server",
"ip": "103.129.149.63"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741129306.34806896",
"full_log": "147.185.132.31 - - [05/Mar/2025:06:01:45 +0700] \"GET / HTTP/1.1\" 404 118 \"-\" \"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "147.185.132.31",
"id": "404",
"url": "/"
},
"location": "/var/log/nginx/access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 1,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.4897",
"full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:44",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 2,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:45",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.346+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5952",
"full_log": "2025/03/05 00:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":2,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:45\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "2",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:45",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.359+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.9221",
"full_log": "2025/03/05 00:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":1,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:44\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "1",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:44",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.596+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.12444",
"full_log": "2025/03/05 07:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":1,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:44\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "1",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:44 wazuh-server sshd[3129036]: Invalid user me from 45.55.159.241 port 47838",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:44",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.608+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 4,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.15660",
"full_log": "2025/03/05 07:03:46 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:46.096+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":2,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133026.5413\",\"full_log\":\"Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:03:45\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"47838\",\"srcuser\":\"me\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "2",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133026.5413",
"full_log": "Mar 05 00:03:45 wazuh-server sshd[3129036]: Disconnected from invalid user me 45.55.159.241 port 47838 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:03:45",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "47838",
"srcuser": "me"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.341+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 1,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.18922",
"full_log": "8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \"GET /Kb8w HTTP/1.1\" 400 264 \"-\" \"Go-http-client/1.1\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "8.220.202.246",
"id": "400",
"url": "/Kb8w"
},
"location": "/var/log/nginx/apidev-access.log"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.342+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 2,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.19377",
"full_log": "8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \"GET /BHem HTTP/1.1\" 404 143 \"-\" \"Go-http-client/1.1\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "8.220.202.246",
"id": "404",
"url": "/BHem"
},
"location": "/var/log/nginx/apidev-access.log"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.362+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 5,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.19832",
"full_log": "2025/03/05 00:03:50 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:50.341+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":1,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"001\",\"name\":\"staging-environment\",\"ip\":\"10.184.0.2\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133030.18922\",\"full_log\":\"8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \\\"GET /Kb8w HTTP/1.1\\\" 400 264 \\\"-\\\" \\\"Go-http-client/1.1\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"8.220.202.246\",\"id\":\"400\",\"url\":\"/Kb8w\"},\"location\":\"/var/log/nginx/apidev-access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:50.341+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "1",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "001",
"name": "staging-environment",
"ip": "10.184.0.2"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.18922",
"full_log": "8.220.202.246 - - [05/Mar/2025:00:03:49 +0000] \"GET /Kb8w HTTP/1.1\" 400 264 \"-\" \"Go-http-client/1.1\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "8.220.202.246",
"id": "400",
"url": "/Kb8w"
},
"location": "/var/log/nginx/apidev-access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.480+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 6,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.22368",
"full_log": "2025/03/05 00:03:50 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:03:50.342+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":2,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"001\",\"name\":\"staging-environment\",\"ip\":\"10.184.0.2\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133030.19377\",\"full_log\":\"8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \\\"GET /BHem HTTP/1.1\\\" 404 143 \\\"-\\\" \\\"Go-http-client/1.1\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"8.220.202.246\",\"id\":\"404\",\"url\":\"/BHem\"},\"location\":\"/var/log/nginx/apidev-access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:03:50.342+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "2",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "001",
"name": "staging-environment",
"ip": "10.184.0.2"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133030.19377",
"full_log": "8.220.202.246 - - [05/Mar/2025:00:03:50 +0000] \"GET /BHem HTTP/1.1\" 404 143 \"-\" \"Go-http-client/1.1\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "8.220.202.246",
"id": "404",
"url": "/BHem"
},
"location": "/var/log/nginx/apidev-access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.303+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 4,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.24904",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.302+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 3,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.573+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 7,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25965",
"full_log": "2025/03/05 00:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.303+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":4,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:07:18.303+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "4",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.586+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 8,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.29245",
"full_log": "2025/03/05 00:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.302+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":3,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:07:18.302+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "3",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.797+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 9,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.32479",
"full_log": "2025/03/05 07:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.302+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":3,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:07:18.302+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "3",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Invalid user yuan from 45.55.159.241 port 36574",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.809+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 10,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.35705",
"full_log": "2025/03/05 07:07:18 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:07:18.303+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":4,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133238.25446\",\"full_log\":\"Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:07:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"36574\",\"srcuser\":\"yuan\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:07:18.303+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "4",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133238.25446",
"full_log": "Mar 05 00:07:16 wazuh-server sshd[3129149]: Disconnected from invalid user yuan 45.55.159.241 port 36574 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:07:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "36574",
"srcuser": "yuan"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 6,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.38977",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 5,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.636+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 11,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.40048",
"full_log": "2025/03/05 00:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":5,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "5",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.650+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 12,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.43299",
"full_log": "2025/03/05 00:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":6,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "6",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.847+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 13,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.46596",
"full_log": "2025/03/05 07:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":5,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "5",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Invalid user suporte from 116.193.190.42 port 36986",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.859+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 14,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.49839",
"full_log": "2025/03/05 07:08:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:16.359+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":6,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133296.39524\",\"full_log\":\"Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:15\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"36986\",\"srcuser\":\"suporte\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "6",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133296.39524",
"full_log": "Mar 05 00:08:15 wazuh-server sshd[3129209]: Disconnected from invalid user suporte 116.193.190.42 port 36986 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:15",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "36986",
"srcuser": "suporte"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.368+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 7,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53128",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.369+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 8,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.647+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 15,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.54189",
"full_log": "2025/03/05 00:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.369+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":8,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:26.369+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "8",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.661+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 16,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.57469",
"full_log": "2025/03/05 00:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.368+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":7,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:26.368+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "7",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.854+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 17,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.60703",
"full_log": "2025/03/05 07:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.368+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":7,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:26.368+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "7",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Invalid user luis from 45.55.159.241 port 60916",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.866+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 18,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.63929",
"full_log": "2025/03/05 07:08:26 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:08:26.369+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":8,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133306.53647\",\"full_log\":\"Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:08:24\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"60916\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:08:26.369+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "8",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133306.53647",
"full_log": "Mar 05 00:08:24 wazuh-server sshd[3129261]: Disconnected from invalid user luis 45.55.159.241 port 60916 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:08:24",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "60916",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 9,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67201",
"full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:30",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 10,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:29",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.714+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 19,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.68266",
"full_log": "2025/03/05 00:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":10,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:29\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "10",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:29",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.728+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 20,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.71510",
"full_log": "2025/03/05 00:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":9,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:30\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "9",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:30",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.914+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 21,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.74798",
"full_log": "2025/03/05 07:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":9,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:30\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "9",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:30 wazuh-server sshd[3129364]: Disconnected from invalid user redbot 45.55.159.241 port 57026 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:30",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.926+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 22,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.78078",
"full_log": "2025/03/05 07:09:30 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:09:30.434+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":10,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133370.67745\",\"full_log\":\"Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:09:29\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"57026\",\"srcuser\":\"redbot\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "10",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133370.67745",
"full_log": "Mar 05 00:09:29 wazuh-server sshd[3129364]: Invalid user redbot from 45.55.159.241 port 57026",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:09:29",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "57026",
"srcuser": "redbot"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 12,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81314",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 11,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.755+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 23,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.82379",
"full_log": "2025/03/05 00:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":11,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "11",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.768+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 24,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.85666",
"full_log": "2025/03/05 00:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":12,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "12",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.946+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 25,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.88907",
"full_log": "2025/03/05 07:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":12,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "12",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Invalid user temp from 116.193.190.42 port 37810",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.959+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 26,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.92140",
"full_log": "2025/03/05 07:10:08 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:08.472+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":11,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133408.81835\",\"full_log\":\"Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:07\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"37810\",\"srcuser\":\"temp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "11",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133408.81835",
"full_log": "Mar 05 00:10:07 wazuh-server sshd[3129425]: Disconnected from invalid user temp 116.193.190.42 port 37810 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:07",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "37810",
"srcuser": "temp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 13,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95419",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 14,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.778+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 27,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.96482",
"full_log": "2025/03/05 00:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":14,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "14",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.792+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 28,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.99768",
"full_log": "2025/03/05 00:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":13,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "13",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.971+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 29,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.103008",
"full_log": "2025/03/05 07:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":14,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "14",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Disconnected from invalid user smart 45.55.159.241 port 53136 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.983+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 30,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.106287",
"full_log": "2025/03/05 07:10:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:34.499+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":13,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133434.95939\",\"full_log\":\"Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"53136\",\"srcuser\":\"smart\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "13",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133434.95939",
"full_log": "Mar 05 00:10:33 wazuh-server sshd[3129477]: Invalid user smart from 45.55.159.241 port 53136",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "53136",
"srcuser": "smart"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:38.775+0000",
"rule": {
"level": 3,
"description": "Host Unblocked by firewall-drop Active Response",
"id": "652",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133438.109520",
"full_log": "2025/03/05 00:10:37 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"delete\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-04T23:10:36.629+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":2,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"001\",\"name\":\"staging-environment\",\"ip\":\"10.184.0.2\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741129836.34840895\",\"full_log\":\"60.16.201.116 - - [04/Mar/2025:23:10:36 +0000] \\\"GET / HTTP/1.1\\\" 404 139 \\\"-\\\" \\\"-\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"60.16.201.116\",\"id\":\"404\",\"url\":\"/\"},\"location\":\"/var/log/nginx/apidev-access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "delete",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-04T23:10:36.629+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "2",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "001",
"name": "staging-environment",
"ip": "10.184.0.2"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741129836.34840895",
"full_log": "60.16.201.116 - - [04/Mar/2025:23:10:36 +0000] \"GET / HTTP/1.1\" 404 139 \"-\" \"-\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "60.16.201.116",
"id": "404",
"url": "/"
},
"location": "/var/log/nginx/apidev-access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.513+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 15,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.112021",
"full_log": "Mar 05 00:10:47 wazuh-server sshd[3129537]: Disconnected from invalid user ts 103.189.88.237 port 53998 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:47",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "53998",
"srcuser": "ts"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.513+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 16,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.112564",
"full_log": "Mar 05 00:10:47 wazuh-server sshd[3129537]: Invalid user ts from 103.189.88.237 port 53998",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:47",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "53998",
"srcuser": "ts"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.794+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 31,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.113084",
"full_log": "2025/03/05 00:10:48 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:48.513+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":16,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133448.112564\",\"full_log\":\"Mar 05 00:10:47 wazuh-server sshd[3129537]: Invalid user ts from 103.189.88.237 port 53998\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:47\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"103.189.88.237\",\"srcport\":\"53998\",\"srcuser\":\"ts\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "103.189.88.237",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:48.513+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "16",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.112564",
"full_log": "Mar 05 00:10:47 wazuh-server sshd[3129537]: Invalid user ts from 103.189.88.237 port 53998",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:47",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "53998",
"srcuser": "ts"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.807+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 32,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.116320",
"full_log": "2025/03/05 00:10:48 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:48.513+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":15,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133448.112564\",\"full_log\":\"Mar 05 00:10:47 wazuh-server sshd[3129537]: Disconnected from invalid user ts 103.189.88.237 port 53998 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:47\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"103.189.88.237\",\"srcport\":\"53998\",\"srcuser\":\"ts\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "103.189.88.237",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:48.513+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "15",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.112564",
"full_log": "Mar 05 00:10:47 wazuh-server sshd[3129537]: Disconnected from invalid user ts 103.189.88.237 port 53998 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:47",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "53998",
"srcuser": "ts"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.979+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 33,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.119602",
"full_log": "2025/03/05 07:10:48 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:48.513+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":15,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133448.112564\",\"full_log\":\"Mar 05 00:10:47 wazuh-server sshd[3129537]: Disconnected from invalid user ts 103.189.88.237 port 53998 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:47\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"103.189.88.237\",\"srcport\":\"53998\",\"srcuser\":\"ts\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "103.189.88.237",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:48.513+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "15",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.112564",
"full_log": "Mar 05 00:10:47 wazuh-server sshd[3129537]: Disconnected from invalid user ts 103.189.88.237 port 53998 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:47",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "53998",
"srcuser": "ts"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.992+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 34,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.122876",
"full_log": "2025/03/05 07:10:48 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:10:48.513+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":16,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133448.112564\",\"full_log\":\"Mar 05 00:10:47 wazuh-server sshd[3129537]: Invalid user ts from 103.189.88.237 port 53998\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:10:47\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"103.189.88.237\",\"srcport\":\"53998\",\"srcuser\":\"ts\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "103.189.88.237",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:10:48.513+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "16",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133448.112564",
"full_log": "Mar 05 00:10:47 wazuh-server sshd[3129537]: Invalid user ts from 103.189.88.237 port 53998",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:10:47",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "53998",
"srcuser": "ts"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:06.803+0000",
"rule": {
"level": 3,
"description": "Host Unblocked by firewall-drop Active Response",
"id": "652",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133466.126104",
"full_log": "2025/03/05 00:11:05 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"delete\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-04T23:11:04.656+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":3,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"001\",\"name\":\"staging-environment\",\"ip\":\"10.184.0.2\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741129864.34844181\",\"full_log\":\"180.95.238.43 - - [04/Mar/2025:23:11:04 +0000] \\\"GET / HTTP/1.1\\\" 404 139 \\\"-\\\" \\\"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"GET\",\"srcip\":\"180.95.238.43\",\"id\":\"404\",\"url\":\"/\"},\"location\":\"/var/log/nginx/apidev-access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "delete",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-04T23:11:04.656+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "3",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "001",
"name": "staging-environment",
"ip": "10.184.0.2"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741129864.34844181",
"full_log": "180.95.238.43 - - [04/Mar/2025:23:11:04 +0000] \"GET / HTTP/1.1\" 404 139 \"-\" \"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "GET",
"srcip": "180.95.238.43",
"id": "404",
"url": "/"
},
"location": "/var/log/nginx/apidev-access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:32.556+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 17,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133492.128807",
"full_log": "Mar 05 00:11:31 wazuh-server sshd[3129601]: Invalid user luis from 45.55.159.241 port 49246",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:11:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "49246",
"srcuser": "luis"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:32.556+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 18,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133492.129327",
"full_log": "Mar 05 00:11:31 wazuh-server sshd[3129601]: Disconnected from invalid user luis 45.55.159.241 port 49246 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:11:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "49246",
"srcuser": "luis"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:32.838+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 35,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133492.129870",
"full_log": "2025/03/05 00:11:32 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:11:32.556+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":17,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133492.129327\",\"full_log\":\"Mar 05 00:11:31 wazuh-server sshd[3129601]: Invalid user luis from 45.55.159.241 port 49246\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:11:31\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"49246\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:11:32.556+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "17",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133492.129327",
"full_log": "Mar 05 00:11:31 wazuh-server sshd[3129601]: Invalid user luis from 45.55.159.241 port 49246",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:11:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "49246",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:32.852+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 36,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133492.133109",
"full_log": "2025/03/05 00:11:32 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:11:32.556+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":18,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133492.129327\",\"full_log\":\"Mar 05 00:11:31 wazuh-server sshd[3129601]: Disconnected from invalid user luis 45.55.159.241 port 49246 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:11:31\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"49246\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:11:32.556+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "18",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133492.129327",
"full_log": "Mar 05 00:11:31 wazuh-server sshd[3129601]: Disconnected from invalid user luis 45.55.159.241 port 49246 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:11:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "49246",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:33.022+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 37,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133493.136394",
"full_log": "2025/03/05 07:11:32 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:11:32.556+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":17,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133492.129327\",\"full_log\":\"Mar 05 00:11:31 wazuh-server sshd[3129601]: Invalid user luis from 45.55.159.241 port 49246\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:11:31\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"49246\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:11:32.556+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "17",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133492.129327",
"full_log": "Mar 05 00:11:31 wazuh-server sshd[3129601]: Invalid user luis from 45.55.159.241 port 49246",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:11:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "49246",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:33.035+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 38,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133493.139625",
"full_log": "2025/03/05 07:11:32 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:11:32.556+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":18,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133492.129327\",\"full_log\":\"Mar 05 00:11:31 wazuh-server sshd[3129601]: Disconnected from invalid user luis 45.55.159.241 port 49246 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:11:31\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"49246\",\"srcuser\":\"luis\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:11:32.556+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "18",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133492.129327",
"full_log": "Mar 05 00:11:31 wazuh-server sshd[3129601]: Disconnected from invalid user luis 45.55.159.241 port 49246 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:11:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "49246",
"srcuser": "luis"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:06.599+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 20,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133526.142902",
"full_log": "Mar 05 00:12:04 wazuh-server sshd[3129663]: Invalid user ismail from 103.189.88.237 port 48394",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:04",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "48394",
"srcuser": "ismail"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:06.599+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 19,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133526.143426",
"full_log": "Mar 05 00:12:04 wazuh-server sshd[3129663]: Disconnected from invalid user ismail 103.189.88.237 port 48394 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:04",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "48394",
"srcuser": "ismail"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:06.871+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 39,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133526.143973",
"full_log": "2025/03/05 00:12:06 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:06.599+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":20,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133526.143426\",\"full_log\":\"Mar 05 00:12:04 wazuh-server sshd[3129663]: Invalid user ismail from 103.189.88.237 port 48394\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:12:04\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"103.189.88.237\",\"srcport\":\"48394\",\"srcuser\":\"ismail\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "103.189.88.237",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:06.599+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "20",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133526.143426",
"full_log": "Mar 05 00:12:04 wazuh-server sshd[3129663]: Invalid user ismail from 103.189.88.237 port 48394",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:04",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "48394",
"srcuser": "ismail"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:06.884+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 40,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133526.147225",
"full_log": "2025/03/05 00:12:06 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:06.599+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":19,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133526.143426\",\"full_log\":\"Mar 05 00:12:04 wazuh-server sshd[3129663]: Disconnected from invalid user ismail 103.189.88.237 port 48394 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:12:04\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"103.189.88.237\",\"srcport\":\"48394\",\"srcuser\":\"ismail\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "103.189.88.237",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:06.599+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "19",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133526.143426",
"full_log": "Mar 05 00:12:04 wazuh-server sshd[3129663]: Disconnected from invalid user ismail 103.189.88.237 port 48394 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:04",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "48394",
"srcuser": "ismail"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:07.053+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 41,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133527.150523",
"full_log": "2025/03/05 07:12:06 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:06.599+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":20,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133526.143426\",\"full_log\":\"Mar 05 00:12:04 wazuh-server sshd[3129663]: Invalid user ismail from 103.189.88.237 port 48394\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:12:04\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"103.189.88.237\",\"srcport\":\"48394\",\"srcuser\":\"ismail\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "103.189.88.237",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:06.599+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "20",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133526.143426",
"full_log": "Mar 05 00:12:04 wazuh-server sshd[3129663]: Invalid user ismail from 103.189.88.237 port 48394",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:04",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "48394",
"srcuser": "ismail"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:07.066+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 42,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133527.153767",
"full_log": "2025/03/05 07:12:06 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:06.599+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":19,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133526.143426\",\"full_log\":\"Mar 05 00:12:04 wazuh-server sshd[3129663]: Disconnected from invalid user ismail 103.189.88.237 port 48394 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:12:04\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"103.189.88.237\",\"srcport\":\"48394\",\"srcuser\":\"ismail\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "103.189.88.237",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:06.599+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "19",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133526.143426",
"full_log": "Mar 05 00:12:04 wazuh-server sshd[3129663]: Disconnected from invalid user ismail 103.189.88.237 port 48394 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:04",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "103.189.88.237",
"srcport": "48394",
"srcuser": "ismail"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:32.627+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 21,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133552.157057",
"full_log": "Mar 05 00:12:31 wazuh-server sshd[3129716]: Invalid user maya from 45.55.159.241 port 45356",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "45356",
"srcuser": "maya"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:32.627+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 22,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133552.157577",
"full_log": "Mar 05 00:12:31 wazuh-server sshd[3129716]: Disconnected from invalid user maya 45.55.159.241 port 45356 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "45356",
"srcuser": "maya"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:32.898+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 43,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133552.158120",
"full_log": "2025/03/05 00:12:32 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:32.627+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":22,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133552.157577\",\"full_log\":\"Mar 05 00:12:31 wazuh-server sshd[3129716]: Disconnected from invalid user maya 45.55.159.241 port 45356 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:12:31\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"45356\",\"srcuser\":\"maya\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:32.627+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "22",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133552.157577",
"full_log": "Mar 05 00:12:31 wazuh-server sshd[3129716]: Disconnected from invalid user maya 45.55.159.241 port 45356 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "45356",
"srcuser": "maya"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:32.913+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 44,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133552.161405",
"full_log": "2025/03/05 00:12:32 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:32.627+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":21,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133552.157577\",\"full_log\":\"Mar 05 00:12:31 wazuh-server sshd[3129716]: Invalid user maya from 45.55.159.241 port 45356\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:12:31\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"45356\",\"srcuser\":\"maya\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:32.627+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "21",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133552.157577",
"full_log": "Mar 05 00:12:31 wazuh-server sshd[3129716]: Invalid user maya from 45.55.159.241 port 45356",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "45356",
"srcuser": "maya"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:33.078+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 45,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133553.164644",
"full_log": "2025/03/05 07:12:32 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:32.627+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":21,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133552.157577\",\"full_log\":\"Mar 05 00:12:31 wazuh-server sshd[3129716]: Invalid user maya from 45.55.159.241 port 45356\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:12:31\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"45356\",\"srcuser\":\"maya\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:32.627+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "21",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133552.157577",
"full_log": "Mar 05 00:12:31 wazuh-server sshd[3129716]: Invalid user maya from 45.55.159.241 port 45356",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "45356",
"srcuser": "maya"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:33.091+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 46,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133553.167875",
"full_log": "2025/03/05 07:12:32 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:32.627+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":22,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133552.157577\",\"full_log\":\"Mar 05 00:12:31 wazuh-server sshd[3129716]: Disconnected from invalid user maya 45.55.159.241 port 45356 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:12:31\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"45356\",\"srcuser\":\"maya\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:32.627+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "22",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133552.157577",
"full_log": "Mar 05 00:12:31 wazuh-server sshd[3129716]: Disconnected from invalid user maya 45.55.159.241 port 45356 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:12:31",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "45356",
"srcuser": "maya"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:52.305+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 3,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133572.171152",
"full_log": "162.142.125.46 - - [05/Mar/2025:07:12:51 +0700] \"PRI * HTTP/2.0\" 400 150 \"-\" \"-\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "PRI",
"srcip": "162.142.125.46",
"id": "400",
"url": "*"
},
"location": "/var/log/nginx/access.log"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:52.919+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 47,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133572.171574",
"full_log": "2025/03/05 00:12:52 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:12:52.305+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":3,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"002\",\"name\":\"prod-server\",\"ip\":\"103.129.149.63\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133572.171152\",\"full_log\":\"162.142.125.46 - - [05/Mar/2025:07:12:51 +0700] \\\"PRI * HTTP/2.0\\\" 400 150 \\\"-\\\" \\\"-\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"PRI\",\"srcip\":\"162.142.125.46\",\"id\":\"400\",\"url\":\"*\"},\"location\":\"/var/log/nginx/access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:12:52.305+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "3",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "002",
"name": "prod-server",
"ip": "103.129.149.63"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133572.171152",
"full_log": "162.142.125.46 - - [05/Mar/2025:07:12:51 +0700] \"PRI * HTTP/2.0\" 400 150 \"-\" \"-\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "PRI",
"srcip": "162.142.125.46",
"id": "400",
"url": "*"
},
"location": "/var/log/nginx/access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:16.672+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 23,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133596.174045",
"full_log": "Mar 05 00:13:16 wazuh-server sshd[3129783]: Invalid user teamspeak3 from 116.193.190.42 port 44018",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "44018",
"srcuser": "teamspeak3"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:16.672+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 24,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133596.174573",
"full_log": "Mar 05 00:13:16 wazuh-server sshd[3129783]: Disconnected from invalid user teamspeak3 116.193.190.42 port 44018 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "44018",
"srcuser": "teamspeak3"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:16.960+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 48,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133596.175124",
"full_log": "2025/03/05 00:13:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:16.672+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":23,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133596.174573\",\"full_log\":\"Mar 05 00:13:16 wazuh-server sshd[3129783]: Invalid user teamspeak3 from 116.193.190.42 port 44018\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"44018\",\"srcuser\":\"teamspeak3\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:16.672+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "23",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133596.174573",
"full_log": "Mar 05 00:13:16 wazuh-server sshd[3129783]: Invalid user teamspeak3 from 116.193.190.42 port 44018",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "44018",
"srcuser": "teamspeak3"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:16.975+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 49,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133596.178392",
"full_log": "2025/03/05 00:13:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:16.672+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":24,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133596.174573\",\"full_log\":\"Mar 05 00:13:16 wazuh-server sshd[3129783]: Disconnected from invalid user teamspeak3 116.193.190.42 port 44018 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"44018\",\"srcuser\":\"teamspeak3\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:16.672+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "24",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133596.174573",
"full_log": "Mar 05 00:13:16 wazuh-server sshd[3129783]: Disconnected from invalid user teamspeak3 116.193.190.42 port 44018 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "44018",
"srcuser": "teamspeak3"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:17.122+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 50,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133597.181706",
"full_log": "2025/03/05 07:13:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:16.672+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":23,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133596.174573\",\"full_log\":\"Mar 05 00:13:16 wazuh-server sshd[3129783]: Invalid user teamspeak3 from 116.193.190.42 port 44018\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"44018\",\"srcuser\":\"teamspeak3\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:16.672+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "23",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133596.174573",
"full_log": "Mar 05 00:13:16 wazuh-server sshd[3129783]: Invalid user teamspeak3 from 116.193.190.42 port 44018",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "44018",
"srcuser": "teamspeak3"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:17.134+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 51,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133597.184966",
"full_log": "2025/03/05 07:13:16 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:16.672+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":24,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133596.174573\",\"full_log\":\"Mar 05 00:13:16 wazuh-server sshd[3129783]: Disconnected from invalid user teamspeak3 116.193.190.42 port 44018 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:16\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"116.193.190.42\",\"srcport\":\"44018\",\"srcuser\":\"teamspeak3\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "116.193.190.42",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:16.672+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "24",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133596.174573",
"full_log": "Mar 05 00:13:16 wazuh-server sshd[3129783]: Disconnected from invalid user teamspeak3 116.193.190.42 port 44018 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:16",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "116.193.190.42",
"srcport": "44018",
"srcuser": "teamspeak3"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:21.119+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 4,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133601.188272",
"full_log": "162.142.125.46 - - [05/Mar/2025:07:13:20 +0700] \"PRI * HTTP/2.0\" 400 150 \"-\" \"-\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "PRI",
"srcip": "162.142.125.46",
"id": "400",
"url": "*"
},
"location": "/var/log/nginx/access.log"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:22.962+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 52,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133602.188694",
"full_log": "2025/03/05 00:13:21 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:21.119+0000\",\"rule\":{\"level\":5,\"description\":\"Web server 400 error code.\",\"id\":\"31101\",\"firedtimes\":4,\"mail\":false,\"groups\":[\"web\",\"accesslog\",\"attack\"],\"pci_dss\":[\"6.5\",\"11.4\"],\"gdpr\":[\"IV_35.7.d\"],\"nist_800_53\":[\"SA.11\",\"SI.4\"],\"tsc\":[\"CC6.6\",\"CC7.1\",\"CC8.1\",\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"002\",\"name\":\"prod-server\",\"ip\":\"103.129.149.63\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133601.188272\",\"full_log\":\"162.142.125.46 - - [05/Mar/2025:07:13:20 +0700] \\\"PRI * HTTP/2.0\\\" 400 150 \\\"-\\\" \\\"-\\\"\",\"decoder\":{\"name\":\"web-accesslog\"},\"data\":{\"protocol\":\"PRI\",\"srcip\":\"162.142.125.46\",\"id\":\"400\",\"url\":\"*\"},\"location\":\"/var/log/nginx/access.log\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:21.119+0000",
"rule": {
"level": "5",
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": "4",
"mail": "false",
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SA.11",
"SI.4"
],
"tsc": [
"CC6.6",
"CC7.1",
"CC8.1",
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "002",
"name": "prod-server",
"ip": "103.129.149.63"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133601.188272",
"full_log": "162.142.125.46 - - [05/Mar/2025:07:13:20 +0700] \"PRI * HTTP/2.0\" 400 150 \"-\" \"-\"",
"decoder": {
"name": "web-accesslog"
},
"data": {
"protocol": "PRI",
"srcip": "162.142.125.46",
"id": "400",
"url": "*"
},
"location": "/var/log/nginx/access.log"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:34.690+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 26,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133614.191165",
"full_log": "Mar 05 00:13:33 wazuh-server sshd[3129854]: Disconnected from invalid user uftp 45.55.159.241 port 41466 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "41466",
"srcuser": "uftp"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:34.690+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 25,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133614.191708",
"full_log": "Mar 05 00:13:32 wazuh-server sshd[3129854]: Invalid user uftp from 45.55.159.241 port 41466",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:32",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "41466",
"srcuser": "uftp"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:34.975+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 53,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133614.192228",
"full_log": "2025/03/05 00:13:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:34.690+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":25,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133614.191708\",\"full_log\":\"Mar 05 00:13:32 wazuh-server sshd[3129854]: Invalid user uftp from 45.55.159.241 port 41466\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:32\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"41466\",\"srcuser\":\"uftp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:34.690+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "25",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133614.191708",
"full_log": "Mar 05 00:13:32 wazuh-server sshd[3129854]: Invalid user uftp from 45.55.159.241 port 41466",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:32",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "41466",
"srcuser": "uftp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:34.989+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 54,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133614.195467",
"full_log": "2025/03/05 00:13:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:34.690+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":26,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133614.191708\",\"full_log\":\"Mar 05 00:13:33 wazuh-server sshd[3129854]: Disconnected from invalid user uftp 45.55.159.241 port 41466 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"41466\",\"srcuser\":\"uftp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:34.690+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "26",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133614.191708",
"full_log": "Mar 05 00:13:33 wazuh-server sshd[3129854]: Disconnected from invalid user uftp 45.55.159.241 port 41466 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "41466",
"srcuser": "uftp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:35.139+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 55,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133615.198752",
"full_log": "2025/03/05 07:13:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:34.690+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":26,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133614.191708\",\"full_log\":\"Mar 05 00:13:33 wazuh-server sshd[3129854]: Disconnected from invalid user uftp 45.55.159.241 port 41466 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:33\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"41466\",\"srcuser\":\"uftp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:34.690+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "26",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133614.191708",
"full_log": "Mar 05 00:13:33 wazuh-server sshd[3129854]: Disconnected from invalid user uftp 45.55.159.241 port 41466 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:33",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "41466",
"srcuser": "uftp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:35.152+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 56,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133615.202029",
"full_log": "2025/03/05 07:13:34 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:34.690+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":25,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133614.191708\",\"full_log\":\"Mar 05 00:13:32 wazuh-server sshd[3129854]: Invalid user uftp from 45.55.159.241 port 41466\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:32\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"41466\",\"srcuser\":\"uftp\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:34.690+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "25",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133614.191708",
"full_log": "Mar 05 00:13:32 wazuh-server sshd[3129854]: Invalid user uftp from 45.55.159.241 port 41466",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:32",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "41466",
"srcuser": "uftp"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:58.711+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 27,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133638.205260",
"full_log": "Mar 05 00:13:58 wazuh-server sshd[3129906]: Invalid user staked from 2.57.122.196 port 41654",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:58",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "2.57.122.196",
"srcport": "41654",
"srcuser": "staked"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:59.003+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 57,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133639.205780",
"full_log": "2025/03/05 00:13:58 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:58.711+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":27,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133638.205260\",\"full_log\":\"Mar 05 00:13:58 wazuh-server sshd[3129906]: Invalid user staked from 2.57.122.196 port 41654\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:58\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"2.57.122.196\",\"srcport\":\"41654\",\"srcuser\":\"staked\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "2.57.122.196",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:58.711+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "27",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133638.205260",
"full_log": "Mar 05 00:13:58 wazuh-server sshd[3129906]: Invalid user staked from 2.57.122.196 port 41654",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:58",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "2.57.122.196",
"srcport": "41654",
"srcuser": "staked"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:59.163+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 58,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133639.209022",
"full_log": "2025/03/05 07:13:58 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:13:58.711+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":27,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133638.205260\",\"full_log\":\"Mar 05 00:13:58 wazuh-server sshd[3129906]: Invalid user staked from 2.57.122.196 port 41654\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:13:58\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"2.57.122.196\",\"srcport\":\"41654\",\"srcuser\":\"staked\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "2.57.122.196",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:13:58.711+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "27",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133638.205260",
"full_log": "Mar 05 00:13:58 wazuh-server sshd[3129906]: Invalid user staked from 2.57.122.196 port 41654",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:13:58",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "2.57.122.196",
"srcport": "41654",
"srcuser": "staked"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:14:40.752+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 28,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133680.212256",
"full_log": "Mar 05 00:14:39 wazuh-server sshd[3129934]: Disconnected from invalid user system 45.55.159.241 port 37580 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:14:39",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "37580",
"srcuser": "system"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:14:40.752+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": 29,
"mail": false,
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133680.212801",
"full_log": "Mar 05 00:14:39 wazuh-server sshd[3129934]: Invalid user system from 45.55.159.241 port 37580",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:14:39",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "37580",
"srcuser": "system"
},
"location": "journald"
} | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:14:41.045+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 59,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
"4.13"
],
"gdpr": [
"IV_35.7.d"
],
"nist_800_53": [
"SI.4"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3",
"CC7.4"
]
},
"agent": {
"id": "xxx",
"name": "xxx",
"ip": "xxx.xxx.xxx.xxx"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133681.213323",
"full_log": "2025/03/05 00:14:40 active-response/bin/firewall-drop: {\"version\":1,\"origin\":{\"name\":\"node01\",\"module\":\"wazuh-execd\"},\"command\":\"add\",\"parameters\":{\"extra_args\":[],\"alert\":{\"timestamp\":\"2025-03-05T00:14:40.752+0000\",\"rule\":{\"level\":5,\"description\":\"sshd: Attempt to login using a non-existent user\",\"id\":\"5710\",\"mitre\":{\"id\":[\"T1110.001\",\"T1021.004\"],\"tactic\":[\"Credential Access\",\"Lateral Movement\"],\"technique\":[\"Password Guessing\",\"SSH\"]},\"firedtimes\":28,\"mail\":false,\"groups\":[\"syslog\",\"sshd\",\"authentication_failed\",\"invalid_login\"],\"gdpr\":[\"IV_35.7.d\",\"IV_32.2\"],\"gpg13\":[\"7.1\"],\"hipaa\":[\"164.312.b\"],\"nist_800_53\":[\"AU.14\",\"AC.7\",\"AU.6\"],\"pci_dss\":[\"10.2.4\",\"10.2.5\",\"10.6.1\"],\"tsc\":[\"CC6.1\",\"CC6.8\",\"CC7.2\",\"CC7.3\"]},\"agent\":{\"id\":\"000\",\"name\":\"wazuh-server\"},\"manager\":{\"name\":\"wazuh-server\"},\"id\":\"1741133680.212801\",\"full_log\":\"Mar 05 00:14:39 wazuh-server sshd[3129934]: Disconnected from invalid user system 45.55.159.241 port 37580 [preauth]\",\"predecoder\":{\"program_name\":\"sshd\",\"timestamp\":\"Mar 05 00:14:39\",\"hostname\":\"wazuh-server\"},\"decoder\":{\"parent\":\"sshd\",\"name\":\"sshd\"},\"data\":{\"srcip\":\"45.55.159.241\",\"srcport\":\"37580\",\"srcuser\":\"system\"},\"location\":\"journald\"},\"program\":\"active-response/bin/firewall-drop\"}}",
"decoder": {
"parent": "ar_log_json",
"name": "ar_log_json"
},
"data": {
"srcip": "45.55.159.241",
"version": "1",
"origin": {
"name": "node01",
"module": "wazuh-execd"
},
"command": "add",
"parameters": {
"extra_args": [],
"alert": {
"timestamp": "2025-03-05T00:14:40.752+0000",
"rule": {
"level": "5",
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
],
"technique": [
"Password Guessing",
"SSH"
]
},
"firedtimes": "28",
"mail": "false",
"groups": [
"syslog",
"sshd",
"authentication_failed",
"invalid_login"
],
"gdpr": [
"IV_35.7.d",
"IV_32.2"
],
"gpg13": [
"7.1"
],
"hipaa": [
"164.312.b"
],
"nist_800_53": [
"AU.14",
"AC.7",
"AU.6"
],
"pci_dss": [
"10.2.4",
"10.2.5",
"10.6.1"
],
"tsc": [
"CC6.1",
"CC6.8",
"CC7.2",
"CC7.3"
]
},
"agent": {
"id": "000",
"name": "wazuh-server"
},
"manager": {
"name": "wazuh-server"
},
"id": "1741133680.212801",
"full_log": "Mar 05 00:14:39 wazuh-server sshd[3129934]: Disconnected from invalid user system 45.55.159.241 port 37580 [preauth]",
"predecoder": {
"program_name": "sshd",
"timestamp": "Mar 05 00:14:39",
"hostname": "wazuh-server"
},
"decoder": {
"parent": "sshd",
"name": "sshd"
},
"data": {
"srcip": "45.55.159.241",
"srcport": "37580",
"srcuser": "system"
},
"location": "journald"
},
"program": "active-response/bin/firewall-drop"
}
},
"location": "/var/ossec/logs/active-responses.log"
} | False Positive |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.