timestamp float64 1.72B 1.72B | message_type stringclasses 212
values | stream_name stringclasses 75
values | pipeline stringclasses 3
values | src_ip stringlengths 0 16 | dst_ip stringclasses 933
values | src_port stringlengths 0 5 | dst_port stringlengths 0 5 | protocol stringclasses 7
values | src_host stringclasses 127
values | dst_host stringclasses 1
value | username stringlengths 0 13 | action stringclasses 46
values | severity stringclasses 11
values | vendor_code stringlengths 0 17 | message_sanitized stringlengths 0 58.8k | label_binary stringclasses 2
values | label_confidence float64 0.5 0.7 | attack_techniques stringclasses 1
value | attack_tactics stringclasses 2
values | defense_techniques stringclasses 1
value | mo_name stringclasses 1
value | suspicion_score float64 0 0 | lifecycle_stage stringclasses 2
values | disposition stringclasses 1
value | disposition_category stringclasses 1
value | is_false_positive bool 1
class | status_name stringclasses 1
value | incident_ids stringclasses 1
value | matched_rules stringclasses 2
values | set_roles stringclasses 2
values | product_name stringclasses 10
values | vendor_name stringclasses 9
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1,722,019,028.459396 | pam_event | pam | syslog | host-0001.example.internal | notice | Dec 24 03:28:10 oakrhelv001 sshd[1461858]: pam_unix(sshd:session): session opened for user epicadm by (uid=0) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Linux PAM | Linux | |||||||||||
1,722,019,028.459375 | management_message | cisco_os | syslog | 10.165.168.254 | notice | <189>104435: SNRREP01: Jul 26 13:36:57.188 CDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: sentinel] [Source: 10.150.151.55] [localport: 22] at 13:36:57 CDT Fri Jul 26 2024 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,028.459351 | access_log | sshd | syslog | host-0001.example.internal | notice | Dec 24 03:28:11 oakrhelv001 sshd[1461747]: Received disconnect from 10.248.113.130 port 57072:11: Terminating connection | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,028.459327 | management_message | cisco_os | syslog | 10.165.168.254 | notice | <189>104434: SNRREP01: Jul 26 13:36:56.437 CDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: sentinel] [Source: 10.150.151.55] [localport: 22] at 13:36:56 CDT Fri Jul 26 2024 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,028.459298 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Dec 31 03:19:50 oakrhelv001 filebeat: 2023-12-31T03:19:50.779-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,028.459274 | auth_success | sshd | syslog | 10.54.116.179 | 61104 | host-0001.example.internal | USER-0001 | notice | Jan 21 03:31:11 oakrhelv001 sshd[1770364]: Accepted password for epicadm from 10.248.113.130 port 61104 ssh2 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | ||||||||||
1,722,019,028.45926 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 21 03:36:50 oakrhelv001 systemd-logind: Removed session 8940192. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,028.459245 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:25:01 oakrhelv001 CROND[1788471]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,028.459228 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 13 15:10:01 oakrhelv001 CROND[786265]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,028.459204 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:55:01 oakrhelv001 CROND[1997207]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,027.458073 | systemd_event | crond | syslog | host-0001.example.internal | notice | Dec 30 20:00:01 oakrhelv001 CROND[3404690]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,027.458056 | auth_success | sshd | syslog | 10.54.116.179 | 59962 | host-0001.example.internal | USER-0001 | notice | Dec 31 03:24:44 oakrhelv001 sshd[557198]: Accepted password for epicadm from 10.248.113.130 port 59962 ssh2 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | ||||||||||
1,722,019,027.458046 | unknown | no_useful_info | syslog | host-0001.example.internal | [2023-12-17T13:04:26.495Z] [ message] [vix] VixTools_ProcessVixCommand: command 186 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | ||||||||||||||
1,722,019,027.45803 | access_log | sshd | syslog | host-0001.example.internal | notice | Jan 7 03:51:07 oakrhelv001 sshd[43386]: Received disconnect from 10.248.113.130 port 60852:11: Terminating connection | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,027.458015 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,027.457998 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Dec 24 03:24:24 oakrhelv001 filebeat: 2023-12-24T03:24:24.701-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,027.457981 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:20:01 oakrhelv001 CROND[1778559]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,027.457966 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 7 03:45:45 oakrhelv001 systemd-logind: Removed session 7262019. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,027.457946 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:20:01 oakrhelv001 CROND[1778558]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,027.457925 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 14 03:31:39 oakrhelv001 systemd-logind: Removed session 8072896. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456409 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:53:01 oakrhelv001 CROND[1978565]: (root) CMD (/usr/lib64/sa/sa2 -A) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456394 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 14 03:31:36 oakrhelv001 systemd-logind: Removed session 8072854. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456378 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456362 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456336 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:10:01 oakrhelv001 CROND[1755970]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456319 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | error | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011ERROR#011[logstash]#011logstash/async.go:280#011Failed to publish events caused by: client is not connected | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456301 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:10:01 oakrhelv001 CROND[1755968]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.45628 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:05:01 oakrhelv001 CROND[1746637]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456261 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 14 03:31:39 oakrhelv001 systemd-logind: Removed session 8072895. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,026.456238 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455555 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:50:01 oakrhelv001 CROND[1961008]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.45554 | unknown | no_useful_info | syslog | host-0001.example.internal | notice | Jan 6 12:01:01 oakrhelv001 run-parts(/etc/cron.hourly)[1737203]: finished 0anacron | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455521 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | error | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011ERROR#011[logstash]#011logstash/async.go:280#011Failed to publish events caused by: read tcp 10.91.134.188:49020->10.251.238.34:5044: read: connection reset by peer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455505 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:15:01 oakrhelv001 CROND[1767609]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455488 | systemd_event | systemd | syslog | host-0001.example.internal | notice | Jan 14 03:31:35 oakrhelv001 systemd: Started Session 8072900 of user epicadm. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455472 | unknown | no_useful_info | syslog | host-0001.example.internal | notice | Jan 6 12:01:01 oakrhelv001 run-parts(/etc/cron.hourly)[1737194]: starting 0anacron | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455455 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:50:01 oakrhelv001 CROND[1961007]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455431 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:45:01 oakrhelv001 CROND[1933212]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455415 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:40:01 oakrhelv001 CROND[1887644]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,025.455391 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:01:01 oakrhelv001 CROND[1737194]: (root) CMD (run-parts /etc/cron.hourly) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,024.45486 | management_message | cisco_os | syslog | 10.100.91.111 | error | <187>2364334: 10.234.70.129: Jul 26 13:36:54.993 CDT: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/41: Power Controller reports power Tstart error detected | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,024.454843 | management_message | cisco_os | syslog | 10.165.168.254 | notice | <189>104432: SNRREP01: Jul 26 13:36:55.486 CDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: sentinel] [Source: 10.150.151.55] [localport: 22] at 13:36:55 CDT Fri Jul 26 2024 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,024.454827 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Dec 31 03:19:50 oakrhelv001 filebeat: 2023-12-31T03:19:50.779-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,024.454811 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:25:01 oakrhelv001 CROND[1788471]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,024.454794 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:55:01 oakrhelv001 CROND[1997207]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,024.454776 | pam_event | pam | syslog | host-0001.example.internal | notice | Dec 24 03:28:10 oakrhelv001 sshd[1461858]: pam_unix(sshd:session): session opened for user epicadm by (uid=0) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Linux PAM | Linux | |||||||||||
1,722,019,024.454764 | unknown | no_useful_info | syslog | host-0001.example.internal | [2023-12-17T13:04:26.495Z] [ message] [vix] VixTools_ProcessVixCommand: command 186 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | ||||||||||||||
1,722,019,024.454749 | management_message | cisco_os | syslog | 10.165.168.254 | informational | <190>104433: SNRREP01: Jul 26 13:36:55.879 CDT: %SYS-6-LOGOUT: User sentinel has exited tty session 2(10.150.151.55) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,024.454728 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:40:01 oakrhelv001 CROND[1887638]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,024.454707 | auth_success | sshd | syslog | 10.54.116.179 | 61104 | host-0001.example.internal | USER-0001 | notice | Jan 21 03:31:11 oakrhelv001 sshd[1770364]: Accepted password for epicadm from 10.248.113.130 port 61104 ssh2 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | ||||||||||
1,722,019,023.453923 | access_log | sshd | syslog | host-0001.example.internal | notice | Dec 24 03:28:11 oakrhelv001 sshd[1461747]: Received disconnect from 10.248.113.130 port 57072:11: Terminating connection | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,023.453883 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 21 03:36:50 oakrhelv001 systemd-logind: Removed session 8940192. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,023.453841 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 14 03:31:39 oakrhelv001 systemd-logind: Removed session 8072896. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,023.453813 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 13 15:10:01 oakrhelv001 CROND[786265]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,023.453784 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 7 03:45:45 oakrhelv001 systemd-logind: Removed session 7262019. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,023.453766 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,023.453729 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,023.453712 | auth_success | sshd | syslog | 10.54.116.179 | 59962 | host-0001.example.internal | USER-0001 | notice | Dec 31 03:24:44 oakrhelv001 sshd[557198]: Accepted password for epicadm from 10.248.113.130 port 59962 ssh2 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | ||||||||||
1,722,019,023.453694 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | error | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011ERROR#011[logstash]#011logstash/async.go:280#011Failed to publish events caused by: client is not connected | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,023.453655 | systemd_event | crond | syslog | host-0001.example.internal | notice | Dec 30 20:00:01 oakrhelv001 CROND[3404690]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.453079 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 14 03:31:39 oakrhelv001 systemd-logind: Removed session 8072895. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.453039 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.453023 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Dec 24 03:24:24 oakrhelv001 filebeat: 2023-12-24T03:24:24.701-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.453009 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.452992 | access_log | sshd | syslog | host-0001.example.internal | notice | Jan 7 03:51:07 oakrhelv001 sshd[43386]: Received disconnect from 10.248.113.130 port 60852:11: Terminating connection | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.452968 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | error | Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011ERROR#011[logstash]#011logstash/async.go:280#011Failed to publish events caused by: read tcp 10.91.134.188:49020->10.251.238.34:5044: read: connection reset by peer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.452937 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:20:01 oakrhelv001 CROND[1778559]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.452907 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:50:01 oakrhelv001 CROND[1961008]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.45288 | systemd_event | systemd | syslog | host-0001.example.internal | notice | Jan 14 03:31:35 oakrhelv001 systemd: Started Session 8072900 of user epicadm. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,022.452856 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:53:01 oakrhelv001 CROND[1978565]: (root) CMD (/usr/lib64/sa/sa2 -A) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,021.452097 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:05:01 oakrhelv001 CROND[1746637]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,021.452075 | unknown | no_useful_info | syslog | host-0001.example.internal | notice | Jan 6 12:01:01 oakrhelv001 run-parts(/etc/cron.hourly)[1737203]: finished 0anacron | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,021.452049 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:20:01 oakrhelv001 CROND[1778558]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,021.452026 | auth_event | systemd_logind | syslog | host-0001.example.internal | notice | Jan 14 03:31:36 oakrhelv001 systemd-logind: Removed session 8072854. | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,021.451991 | management_message | cisco_os | syslog | 10.237.35.124 | error | <187>307625: WCFREP01: Jul 26 13:36:54.505 CDT: %LINK-3-UPDOWN: Interface GigabitEthernet2/0/19, changed state to down | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,021.451968 | generic_event | generic_log | syslog | 10.156.151.240 | notice | <141>Jul 26 18:36:55 HOST-0015 Host: HOST-0001 Duration: 16755:19:26 Count: 201020; NOTICE: Scheduled job failed. (deviceInfo) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,021.451941 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:15:01 oakrhelv001 CROND[1767609]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,021.451899 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:10:01 oakrhelv001 CROND[1755970]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,021.451868 | auth_failure | generic_log | syslog | 10.156.151.240 | informational | <142>Jul 26 18:36:55 HOST-0015 Host: HOST-0001 Duration: 6844:24:45 Count: 904275; INFORMATIONAL: Authentication failure. | suspicious | 0.7 | [] | ["TA0002", "TA0001"] | [] | 0 | initial-compromise | Unprocessed | automated | false | [] | ["Authentication Failure", "Authentication Failure"] | ["Exploiting Host", "Exploiting Target"] | Precinct | WitFoo | |||||||||||
1,722,019,021.45184 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:01:01 oakrhelv001 CROND[1737194]: (root) CMD (run-parts /etc/cron.hourly) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,020.451319 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:10:01 oakrhelv001 CROND[1755968]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,020.451302 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:50:01 oakrhelv001 CROND[1961007]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,020.451275 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:45:01 oakrhelv001 CROND[1933212]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,020.45125 | unknown | no_useful_info | syslog | host-0001.example.internal | notice | Jan 6 12:01:01 oakrhelv001 run-parts(/etc/cron.hourly)[1737194]: starting 0anacron | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,020.45122 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:40:01 oakrhelv001 CROND[1887644]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,020.451193 | management_message | cisco_os | syslog | 10.100.91.111 | notice | <189>2364333: 10.234.70.129: Jul 26 13:36:54.992 CDT: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/41: PD removed | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,020.451165 | management_message | cisco_os | syslog | 10.100.91.111 | notice | <189>2364332: 10.234.70.129: Jul 26 13:36:54.296 CDT: %ILPOWER-5-DETECT: Interface Gi1/0/41: Power Device detected: Cisco PD | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,020.451132 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:40:01 oakrhelv001 CROND[1887638]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,020.451108 | pam_event | pam | syslog | host-0001.example.internal | notice | Dec 24 03:28:10 oakrhelv001 sshd[1461858]: pam_unix(sshd:session): session opened for user epicadm by (uid=0) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Linux PAM | Linux | |||||||||||
1,722,019,020.451064 | management_message | cisco_os | syslog | 10.72.142.117 | notice | <189>22450: 10.95.18.212: Jul 26 13:36:54.395 CDT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet4/0/25, changed state to up | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,019.450487 | management_message | cisco_os | syslog | 10.72.142.117 | error | <187>22449: 10.95.18.212: Jul 26 13:36:53.395 CDT: %LINK-3-UPDOWN: Interface GigabitEthernet4/0/25, changed state to up | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,019.450469 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 6 12:25:01 oakrhelv001 CROND[1788471]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,019.450456 | management_message | cisco_os | syslog | 10.171.95.188 | notice | <189>577858: LAVREP01: Jul 26 13:36:54.315 CDT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/29, changed state to up | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,019.450439 | systemd_event | crond | syslog | host-0001.example.internal | notice | Jan 19 23:55:01 oakrhelv001 CROND[1997207]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,019.450424 | management_message | cisco_os | syslog | 10.171.95.188 | error | <187>577857: LAVREP01: Jul 26 13:36:53.315 CDT: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/29, changed state to up | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | Cisco Network Operating System | Cisco | |||||||||||
1,722,019,019.450413 | unknown | no_useful_info | syslog | host-0001.example.internal | [2023-12-17T13:04:26.495Z] [ message] [vix] VixTools_ProcessVixCommand: command 186 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | ||||||||||||||
1,722,019,019.450379 | diagnostic_event | filebeat_diagnostic | syslog | host-0001.example.internal | informational | Dec 31 03:19:50 oakrhelv001 filebeat: 2023-12-31T03:19:50.779-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,019.45036 | auth_success | sshd | syslog | 10.54.116.179 | 61104 | host-0001.example.internal | USER-0001 | notice | Jan 21 03:31:11 oakrhelv001 sshd[1770364]: Accepted password for epicadm from 10.248.113.130 port 61104 ssh2 | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | ||||||||||
1,722,019,019.450343 | access_log | sshd | syslog | host-0001.example.internal | notice | Dec 24 03:28:11 oakrhelv001 sshd[1461747]: Received disconnect from 10.248.113.130 port 57072:11: Terminating connection | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] | |||||||||||||
1,722,019,019.45031 | systemd_event | crond | syslog | host-0001.example.internal | notice | Dec 30 20:00:01 oakrhelv001 CROND[3404690]: (root) CMD (/usr/lib64/sa/sa1 1 1) | benign | 0.5 | [] | [] | [] | 0 | none | Unprocessed | automated | false | [] | [] | [] |
WitFoo Precinct6 Cybersecurity Dataset (large)
Overview
A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by WitFoo Precinct version 6.x. This dataset contains 114,234,041 sanitized security events (signal logs) across 5 organizations and 12,361 incident provenance graphs (47,632 nodes, 32,086,552 edges).
Available in two sizes:
witfoo/precinct6-cybersecurity— 2.1M signals (smaller, faster to load; same incidents and graph methodology)witfoo/precinct6-cybersecurity-100m— 114M signals (this dataset)
Generate your own: WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: witfoo/dataset-from-precinct6
This dataset is designed to support research in:
- Provenance graph-based intrusion detection (KnowHow, NodLink, and similar systems)
- AI-driven cyber defense simulation (CybORG and MARL-based defense policy training)
- Security alert classification (malicious vs. suspicious vs. benign event labeling)
- Attack lifecycle analysis using MITRE ATT&CK framework mappings
- Detection rule evaluation using WitFoo's 261 lead detection rules
Quick Start
from datasets import load_dataset
# Load flat signal logs (114M rows across 58 Parquet shards)
signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")
# Find analyst-confirmed malicious events
malicious_confirmed = signals.filter(
lambda x: x["label_binary"] == "malicious" and x["disposition"] == "Disrupted"
)
# Find suspicious events that matched detection rules but are not in confirmed incidents
suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")
# Load provenance graph (47.6k nodes, 32M edges)
nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")
# Load full incident graphs (12,361 incidents with embedded artifacts, leads, frameworks)
incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")
Label Distribution
| Label | Count | Percentage |
|---|---|---|
benign |
113,543,372 | 99.40% |
suspicious |
616,605 | 0.54% |
malicious |
74,064 | 0.06% |
Disposition breakdown (the raw Precinct status, exposed for ground-truth stratification — see Ground Truth):
| Disposition | Count | Meaning |
|---|---|---|
Unprocessed |
114,192,640 | No analyst review (default state for benign/suspicious + un-reviewed malicious) |
Disrupted |
41,391 | SOC analyst confirmed and intervened |
Dismissed |
10 | SOC analyst dismissed |
Signal Columns
| Column | Type | Description |
|---|---|---|
timestamp |
float | Unix epoch timestamp |
message_type |
string | Event classification (e.g., firewall_action, account_logon, AssumeRole) |
stream_name |
string | Source product/data stream |
pipeline |
string | Ingestion pipeline |
src_ip |
string | Source IP (sanitized) |
dst_ip |
string | Destination IP (sanitized) |
src_port |
string | Source port |
dst_port |
string | Destination port |
protocol |
string | Network protocol (6=TCP, 17=UDP, 1=ICMP) |
src_host |
string | Source hostname (sanitized) |
dst_host |
string | Destination hostname (sanitized) |
username |
string | Associated username (sanitized) |
action |
string | Event action (block, permit, logon, logoff) |
severity |
string | Severity level |
vendor_code |
string | Vendor-specific event code |
message_sanitized |
string | Full sanitized raw log message |
label_binary |
string | malicious, suspicious, or benign |
label_confidence |
float | Confidence score (0.0–1.0). See Scoring. |
attack_techniques |
string | JSON array of MITRE ATT&CK technique IDs (e.g., ["T1041","T1567"]) |
attack_tactics |
string | JSON array of MITRE ATT&CK tactic IDs (TA0001-style) |
defense_techniques |
string | JSON array of MITRE D3FEND defense technique IDs |
suspicion_score |
float | WitFoo suspicion score (0.0–1.0). See Scoring. |
mo_name |
string | Modus operandi (e.g., Data Theft) |
lifecycle_stage |
string | Kill chain stage (e.g., initial-compromise, complete-mission) |
disposition |
string | Raw Precinct status (Disrupted, Investigating, Resolved, Dismissed, False Positive, Unprocessed) |
disposition_category |
string | Bucketed disposition (confirmed-malicious, false-positive, dismissed, automated) |
is_false_positive |
bool | True if SOC analyst marked the incident as a false positive |
status_name |
string | Same as disposition (raw Precinct status) |
incident_ids |
string | JSON array of incident UUIDs (empty for benign/suspicious) |
matched_rules |
string | JSON array of matched WitFoo lead rule descriptions |
set_roles |
string | JSON array of classification roles (e.g., Exploiting Host, C2 Server) |
product_name |
string | Security product name (e.g., ASA Firewall, Falcon) |
vendor_name |
string | Product vendor (e.g., Cisco, Crowdstrike) |
Source Products
The dataset contains events from 158 security products across 70+ vendors. Complete catalog in reference/lead_rules_catalog.json.
| Category | Products |
|---|---|
| Firewalls | Cisco ASA, Palo Alto PAN NGFW, Fortinet FortiGate, Checkpoint, Meraki, SonicWall, pfSense, Barracuda, Juniper SRX |
| Endpoint Protection | CrowdStrike Falcon, Symantec SEP, Carbon Black, Cylance, SentinelOne, Deep Instinct, Sophos, McAfee, ESET |
| Network Detection | Cisco Stealthwatch, Cisco Firepower, Suricata IDS, TippingPoint IPS, Vectra Cognito |
| Identity & Access | Microsoft Windows AD, Cisco ISE, Centrify, CyberArk, Duo, Okta, Beyond Trust |
| Cloud Security | AWS CloudTrail, AWS VPC Flow Logs, AWS GuardDuty, Azure Security, Zscaler, Netskope, Cisco Umbrella |
| Email Security | ProofPoint, Mimecast, FireEye EX, Barracuda ESS, Cisco IronPort, Checkpoint Harmony |
| Threat Intelligence | FireEye NX/HX/AX/CMS, Trend Micro, QRadar, Microsoft ATA, Cortex XDR |
| Infrastructure | VMware vCenter/NSX, Elastic Filebeat, Linux (sshd, PAM, systemd, auditd), Apache, HAProxy |
Labeling Methodology
Three-tier labels derived from two sources:
malicious(74,064): Events embedded as leads inside confirmed incidents. Extracted directly from incident lead objects with suspicion scores, modus operandi, and MITRE mappings.suspicious(616,605): Events matching WitFoo's 261 lead detection rules but not present in confirmed incidents.benign(113,543,372): Events not matching any detection rules and not in any incident.
Ground Truth and Disposition
All labels in this dataset are derived from WitFoo Precinct's automated incident correlation engine — there is no independent, analyst-verified ground truth. Researchers should treat Precinct's analysis as a strong but imperfect oracle. The disposition column lets you assess label quality on a per-record basis:
disposition |
Meaning | Confidence in label |
|---|---|---|
Disrupted |
SOC analyst confirmed the incident and intervened | High — human-confirmed malicious |
Investigating |
SOC analyst is actively investigating | Medium — analyst engaged |
Resolved |
SOC analyst confirmed and resolved | High — human-confirmed malicious |
Dismissed |
SOC analyst dismissed the incident | Negative — analyst rejected |
False Positive |
SOC analyst confirmed false positive | Negative — analyst rejected |
Unprocessed |
Automated detection, no human review | Lower — Precinct-confidence only |
The disposition_category column buckets these into four values for easier filtering: confirmed-malicious, false-positive, dismissed, automated. For experiments where ground-truth quality matters, restrict to records where disposition ∈ {Disrupted, Resolved} to compare against analyst-confirmed labels. This dataset has 41,391 records with Disrupted status, 10 with Dismissed, and the remainder with Unprocessed (no analyst review).
For benign and suspicious records, disposition is Unprocessed (no incident association). For malicious records, disposition reflects the parent incident's status at extraction time.
Scoring
The dataset exposes two related score fields:
suspicion_score(float, 0.0–1.0) — Precinct's proprietary suspicion score from the parent incident. Populated for malicious records; zero for benign and suspicious. (Previously this column was always0— that was a defaulting bug, now fixed.)label_confidence(float, 0.0–1.0) — Confidence in the assignedlabel_binarytier. Computed deterministically from corroborating signal:Label Formula maliciousmax(0.6, suspicion_score)clamped to 0.95; lowered to 0.3 ifis_false_positivesuspicious0.4 + 0.1 × n_matched_rules + 0.05 × n_set_roles, clamped to [0.5, 0.85]benign0.5(no positive evidence either way)Note:
label_confidenceis not the probability the activity is malicious — it indicates how much corroborating evidence supports the assigned tier. Source:src/precinct6_dataset/label.py.
MITRE ATT&CK Mappings
Attack technique and tactic labels are derived from three sources, with deduplication:
- WitFoo set role names attached to the incident (e.g.,
C2 Server→TA0011Command and Control,T1071Application Layer Protocol) - Modus operandi name on the incident (e.g.,
Ransomware→TA0001,TA0002,TA0040;T1486Data Encrypted for Impact) - Per-product framework data embedded in
incident.nodes.products.frameworks(when present)
Tactic IDs use the standard MITRE ATT&CK Enterprise format (TA0001 through TA0043). Technique IDs are top-level techniques representing the most likely category for a given role. Researchers wanting precise per-event technique attribution should treat these as priors. Full mapping tables in src/precinct6_dataset/mitre_mapping.py.
Per-edge/per-node attribution in graph output: attack_tactics, attack_techniques, set_roles, lifecycle_stage, label_binary, label_confidence, suspicion_score, disposition are attached at the edge level in edges.jsonl and in per-incident GraphML files. Nodes in incidents.jsonl carry their own sets and products dicts with per-entity information.
Graph Data
| Component | Count |
|---|---|
| Nodes (artifact-derived hosts + credentials) | 47,632 |
Edges (artifact EVENT/NETWORK_FLOW + incident INCIDENT_LINK) |
32,086,552 |
| Incidents | 12,361 |
Per-edge labels in edges.jsonl include attack_techniques, attack_tactics, set_roles, lifecycle_stage, disposition, mo_name, suspicion_score, incident_id (for INCIDENT_LINK edges).
Attack Reports
graph/attack_reports.jsonl contains one natural-language threat-hunting report per incident (12,361 reports). Each report is deterministically composed from structured incident metadata (modus operandi, set roles, lead descriptions, MITRE mappings, timestamps) and explicitly states that it reflects Precinct's automated correlation engine output, not an independent threat-hunting investigation.
Each record contains: incident_id, report_text, mo_name, suspicion_score, disposition, attack_techniques, attack_tactics, lead_count, set_role_names, matched_rules, products_observed, lifecycle_stage, and timing fields.
Researchers can audit exactly how each sentence is derived by reading src/precinct6_dataset/attack_reports.py.
Additional Files
signals/signals-NNNNN.parquet— 58 Parquet shards (~270 MB each), 2M rows per shard except final shard. Total ~15.7 GB.signals/metadata.json— Per-shard summary, label/disposition distributions, top message types and streams.graph/nodes.jsonl— 47,632 graph nodes (hosts + credentials derived from artifact src/dst/username).graph/edges.jsonl— 32,086,552 graph edges, each withlabelsdict carrying MITRE, disposition, set_roles, etc.graph/incidents.jsonl— Full incident records (12,361 lines, ~638 MB) with embeddednodes,edges,leads, and framework mappings.graph/incidents_graphml/{0-f}/{incident_id}.graphml— 12,361 per-incident GraphML files, sharded into 16 subdirectories by first hex char of the incident UUID (HuggingFace caps directories at 10,000 files). Each file is small (KB-MB) and loadable in Gephi, NetworkX, igraph, or DGL. Ideal for graph-based research where loading the entire dataset is impractical.graph/attack_reports.jsonl— Natural-language threat-hunting reports (12,361 reports, ~21 MB). See Attack Reports.reference/lead_rules_catalog.json— Complete catalog of 261 WitFoo lead detection rules, 158 security products, 106 classification sets, and 216 stream-to-product mappings.
Note on the artifact-level graph: With 32M edges, the monolithic graph.graphml is intentionally not shipped at this scale — per-incident GraphMLs and the streaming edges.jsonl are the recommended entry points. Methodology and content fields are otherwise identical to the 2M version.
Sanitization
All customer-identifying information has been removed through a comprehensive 4-layer sanitization pipeline. The pipeline is open source under the Apache 2.0 license.
- Structured field sanitization + Aho-Corasick multi-pattern sweep — Known fields are replaced with deterministic tokens (IPs → RFC 5737 ranges, hostnames →
HOST-NNNN, etc.). Every record is then swept using an Aho-Corasick automaton built from 97,000+ PII registry entries. - Format-specific log message parsing — Eight specialized parsers handle Cisco ASA syslog, Windows Security Event XML, WinLogBeat JSON, AWS CloudTrail, Palo Alto Networks, VMware vCenter, DNS logs, and a generic fallback.
- Machine learning residual detection — Microsoft Presidio (spaCy NLP) and BERT NER scan for residual PII. New discoveries trigger full re-sanitization.
- Large language model contextual review — Claude reviews stratified samples for subtle PII. Findings trigger re-sanitization.
The four layers run in cycles. PII discovered by ML/AI in one cycle is caught automatically by Layer 1 in all subsequent cycles. Final PII registry: 97,046 unique mappings across 13 categories (IPs, hostnames, usernames, orgs, credentials, SIDs, emails, ARNs, etc.). All replacements are consistent — the same original value always maps to the same token, preserving graph topology.
Research Context
This dataset was produced in collaboration with the University of Canterbury (New Zealand) Computer Science and Software Engineering department for two research projects:
- AI Cyber-Security Battle Simulator — Improving CybORG with realistic IDS observations, graph-based defense policies, and AI-driven attacker modeling
- Intrusion Detection based on Provenance Graphs — Evaluating reproducibility and generalizability of KnowHow and NodLink detection methods
Limitations
- Label imbalance: 99.40% benign reflects production SOC reality. Sampling strategies needed for balanced training.
- Temporal scope: July–August 2024.
- Ground truth: All labels derive from Precinct's automated correlation. Use the
dispositioncolumn to stratify by analyst review level. - Shared incidents: The same 12,361 incidents appear in both the 2M and this dataset (incidents are stored separately from signal data; only the signal sample size differs).
- Sanitization trade-offs: Some log message detail is reduced by PII replacement, particularly in free-text fields.
Citation
@dataset{witfoo_precinct6_100m_2026,
title={WitFoo Precinct6 Cybersecurity Dataset (large)},
author={WitFoo, Inc.},
year={2026},
url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
license={Apache-2.0}
}
License
- Downloads last month
- 2,743