Dataset Viewer
Auto-converted to Parquet Duplicate
timestamp
float64
1.72B
1.72B
message_type
stringclasses
212 values
stream_name
stringclasses
75 values
pipeline
stringclasses
3 values
src_ip
stringlengths
0
16
dst_ip
stringclasses
933 values
src_port
stringlengths
0
5
dst_port
stringlengths
0
5
protocol
stringclasses
7 values
src_host
stringclasses
127 values
dst_host
stringclasses
1 value
username
stringlengths
0
13
action
stringclasses
46 values
severity
stringclasses
11 values
vendor_code
stringlengths
0
17
message_sanitized
stringlengths
0
58.8k
label_binary
stringclasses
2 values
label_confidence
float64
0.5
0.7
attack_techniques
stringclasses
1 value
attack_tactics
stringclasses
2 values
defense_techniques
stringclasses
1 value
mo_name
stringclasses
1 value
suspicion_score
float64
0
0
lifecycle_stage
stringclasses
2 values
disposition
stringclasses
1 value
disposition_category
stringclasses
1 value
is_false_positive
bool
1 class
status_name
stringclasses
1 value
incident_ids
stringclasses
1 value
matched_rules
stringclasses
2 values
set_roles
stringclasses
2 values
product_name
stringclasses
10 values
vendor_name
stringclasses
9 values
1,722,019,028.459396
pam_event
pam
syslog
host-0001.example.internal
notice
Dec 24 03:28:10 oakrhelv001 sshd[1461858]: pam_unix(sshd:session): session opened for user epicadm by (uid=0)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Linux PAM
Linux
1,722,019,028.459375
management_message
cisco_os
syslog
10.165.168.254
notice
<189>104435: SNRREP01: Jul 26 13:36:57.188 CDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: sentinel] [Source: 10.150.151.55] [localport: 22] at 13:36:57 CDT Fri Jul 26 2024
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,028.459351
access_log
sshd
syslog
host-0001.example.internal
notice
Dec 24 03:28:11 oakrhelv001 sshd[1461747]: Received disconnect from 10.248.113.130 port 57072:11: Terminating connection
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,028.459327
management_message
cisco_os
syslog
10.165.168.254
notice
<189>104434: SNRREP01: Jul 26 13:36:56.437 CDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: sentinel] [Source: 10.150.151.55] [localport: 22] at 13:36:56 CDT Fri Jul 26 2024
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,028.459298
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Dec 31 03:19:50 oakrhelv001 filebeat: 2023-12-31T03:19:50.779-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,028.459274
auth_success
sshd
syslog
10.54.116.179
61104
host-0001.example.internal
USER-0001
notice
Jan 21 03:31:11 oakrhelv001 sshd[1770364]: Accepted password for epicadm from 10.248.113.130 port 61104 ssh2
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,028.45926
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 21 03:36:50 oakrhelv001 systemd-logind: Removed session 8940192.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,028.459245
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:25:01 oakrhelv001 CROND[1788471]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,028.459228
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 13 15:10:01 oakrhelv001 CROND[786265]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,028.459204
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:55:01 oakrhelv001 CROND[1997207]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.458073
systemd_event
crond
syslog
host-0001.example.internal
notice
Dec 30 20:00:01 oakrhelv001 CROND[3404690]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.458056
auth_success
sshd
syslog
10.54.116.179
59962
host-0001.example.internal
USER-0001
notice
Dec 31 03:24:44 oakrhelv001 sshd[557198]: Accepted password for epicadm from 10.248.113.130 port 59962 ssh2
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.458046
unknown
no_useful_info
syslog
host-0001.example.internal
[2023-12-17T13:04:26.495Z] [ message] [vix] VixTools_ProcessVixCommand: command 186
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.45803
access_log
sshd
syslog
host-0001.example.internal
notice
Jan 7 03:51:07 oakrhelv001 sshd[43386]: Received disconnect from 10.248.113.130 port 60852:11: Terminating connection
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.458015
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.457998
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Dec 24 03:24:24 oakrhelv001 filebeat: 2023-12-24T03:24:24.701-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.457981
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:20:01 oakrhelv001 CROND[1778559]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.457966
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 7 03:45:45 oakrhelv001 systemd-logind: Removed session 7262019.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.457946
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:20:01 oakrhelv001 CROND[1778558]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,027.457925
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 14 03:31:39 oakrhelv001 systemd-logind: Removed session 8072896.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456409
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:53:01 oakrhelv001 CROND[1978565]: (root) CMD (/usr/lib64/sa/sa2 -A)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456394
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 14 03:31:36 oakrhelv001 systemd-logind: Removed session 8072854.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456378
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456362
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456336
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:10:01 oakrhelv001 CROND[1755970]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456319
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
error
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011ERROR#011[logstash]#011logstash/async.go:280#011Failed to publish events caused by: client is not connected
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456301
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:10:01 oakrhelv001 CROND[1755968]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.45628
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:05:01 oakrhelv001 CROND[1746637]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456261
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 14 03:31:39 oakrhelv001 systemd-logind: Removed session 8072895.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,026.456238
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455555
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:50:01 oakrhelv001 CROND[1961008]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.45554
unknown
no_useful_info
syslog
host-0001.example.internal
notice
Jan 6 12:01:01 oakrhelv001 run-parts(/etc/cron.hourly)[1737203]: finished 0anacron
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455521
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
error
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011ERROR#011[logstash]#011logstash/async.go:280#011Failed to publish events caused by: read tcp 10.91.134.188:49020->10.251.238.34:5044: read: connection reset by peer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455505
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:15:01 oakrhelv001 CROND[1767609]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455488
systemd_event
systemd
syslog
host-0001.example.internal
notice
Jan 14 03:31:35 oakrhelv001 systemd: Started Session 8072900 of user epicadm.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455472
unknown
no_useful_info
syslog
host-0001.example.internal
notice
Jan 6 12:01:01 oakrhelv001 run-parts(/etc/cron.hourly)[1737194]: starting 0anacron
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455455
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:50:01 oakrhelv001 CROND[1961007]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455431
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:45:01 oakrhelv001 CROND[1933212]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455415
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:40:01 oakrhelv001 CROND[1887644]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,025.455391
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:01:01 oakrhelv001 CROND[1737194]: (root) CMD (run-parts /etc/cron.hourly)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,024.45486
management_message
cisco_os
syslog
10.100.91.111
error
<187>2364334: 10.234.70.129: Jul 26 13:36:54.993 CDT: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/41: Power Controller reports power Tstart error detected
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,024.454843
management_message
cisco_os
syslog
10.165.168.254
notice
<189>104432: SNRREP01: Jul 26 13:36:55.486 CDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: sentinel] [Source: 10.150.151.55] [localport: 22] at 13:36:55 CDT Fri Jul 26 2024
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,024.454827
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Dec 31 03:19:50 oakrhelv001 filebeat: 2023-12-31T03:19:50.779-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,024.454811
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:25:01 oakrhelv001 CROND[1788471]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,024.454794
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:55:01 oakrhelv001 CROND[1997207]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,024.454776
pam_event
pam
syslog
host-0001.example.internal
notice
Dec 24 03:28:10 oakrhelv001 sshd[1461858]: pam_unix(sshd:session): session opened for user epicadm by (uid=0)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Linux PAM
Linux
1,722,019,024.454764
unknown
no_useful_info
syslog
host-0001.example.internal
[2023-12-17T13:04:26.495Z] [ message] [vix] VixTools_ProcessVixCommand: command 186
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,024.454749
management_message
cisco_os
syslog
10.165.168.254
informational
<190>104433: SNRREP01: Jul 26 13:36:55.879 CDT: %SYS-6-LOGOUT: User sentinel has exited tty session 2(10.150.151.55)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,024.454728
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:40:01 oakrhelv001 CROND[1887638]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,024.454707
auth_success
sshd
syslog
10.54.116.179
61104
host-0001.example.internal
USER-0001
notice
Jan 21 03:31:11 oakrhelv001 sshd[1770364]: Accepted password for epicadm from 10.248.113.130 port 61104 ssh2
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453923
access_log
sshd
syslog
host-0001.example.internal
notice
Dec 24 03:28:11 oakrhelv001 sshd[1461747]: Received disconnect from 10.248.113.130 port 57072:11: Terminating connection
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453883
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 21 03:36:50 oakrhelv001 systemd-logind: Removed session 8940192.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453841
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 14 03:31:39 oakrhelv001 systemd-logind: Removed session 8072896.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453813
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 13 15:10:01 oakrhelv001 CROND[786265]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453784
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 7 03:45:45 oakrhelv001 systemd-logind: Removed session 7262019.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453766
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453729
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453712
auth_success
sshd
syslog
10.54.116.179
59962
host-0001.example.internal
USER-0001
notice
Dec 31 03:24:44 oakrhelv001 sshd[557198]: Accepted password for epicadm from 10.248.113.130 port 59962 ssh2
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453694
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
error
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.573-0600#011ERROR#011[logstash]#011logstash/async.go:280#011Failed to publish events caused by: client is not connected
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,023.453655
systemd_event
crond
syslog
host-0001.example.internal
notice
Dec 30 20:00:01 oakrhelv001 CROND[3404690]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.453079
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 14 03:31:39 oakrhelv001 systemd-logind: Removed session 8072895.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.453039
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.453023
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Dec 24 03:24:24 oakrhelv001 filebeat: 2023-12-24T03:24:24.701-0600#011INFO#011[publisher]#011pipeline/retry.go:223#011 done
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.453009
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.452992
access_log
sshd
syslog
host-0001.example.internal
notice
Jan 7 03:51:07 oakrhelv001 sshd[43386]: Received disconnect from 10.248.113.130 port 60852:11: Terminating connection
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.452968
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
error
Jan 7 03:45:44 oakrhelv001 filebeat: 2024-01-07T03:45:44.550-0600#011ERROR#011[logstash]#011logstash/async.go:280#011Failed to publish events caused by: read tcp 10.91.134.188:49020->10.251.238.34:5044: read: connection reset by peer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.452937
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:20:01 oakrhelv001 CROND[1778559]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.452907
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:50:01 oakrhelv001 CROND[1961008]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.45288
systemd_event
systemd
syslog
host-0001.example.internal
notice
Jan 14 03:31:35 oakrhelv001 systemd: Started Session 8072900 of user epicadm.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,022.452856
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:53:01 oakrhelv001 CROND[1978565]: (root) CMD (/usr/lib64/sa/sa2 -A)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,021.452097
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:05:01 oakrhelv001 CROND[1746637]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,021.452075
unknown
no_useful_info
syslog
host-0001.example.internal
notice
Jan 6 12:01:01 oakrhelv001 run-parts(/etc/cron.hourly)[1737203]: finished 0anacron
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,021.452049
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:20:01 oakrhelv001 CROND[1778558]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,021.452026
auth_event
systemd_logind
syslog
host-0001.example.internal
notice
Jan 14 03:31:36 oakrhelv001 systemd-logind: Removed session 8072854.
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,021.451991
management_message
cisco_os
syslog
10.237.35.124
error
<187>307625: WCFREP01: Jul 26 13:36:54.505 CDT: %LINK-3-UPDOWN: Interface GigabitEthernet2/0/19, changed state to down
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,021.451968
generic_event
generic_log
syslog
10.156.151.240
notice
<141>Jul 26 18:36:55 HOST-0015 Host: HOST-0001 Duration: 16755:19:26 Count: 201020; NOTICE: Scheduled job failed. (deviceInfo)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,021.451941
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:15:01 oakrhelv001 CROND[1767609]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,021.451899
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:10:01 oakrhelv001 CROND[1755970]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,021.451868
auth_failure
generic_log
syslog
10.156.151.240
informational
<142>Jul 26 18:36:55 HOST-0015 Host: HOST-0001 Duration: 6844:24:45 Count: 904275; INFORMATIONAL: Authentication failure.
suspicious
0.7
[]
["TA0002", "TA0001"]
[]
0
initial-compromise
Unprocessed
automated
false
[]
["Authentication Failure", "Authentication Failure"]
["Exploiting Host", "Exploiting Target"]
Precinct
WitFoo
1,722,019,021.45184
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:01:01 oakrhelv001 CROND[1737194]: (root) CMD (run-parts /etc/cron.hourly)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,020.451319
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:10:01 oakrhelv001 CROND[1755968]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,020.451302
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:50:01 oakrhelv001 CROND[1961007]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,020.451275
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:45:01 oakrhelv001 CROND[1933212]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,020.45125
unknown
no_useful_info
syslog
host-0001.example.internal
notice
Jan 6 12:01:01 oakrhelv001 run-parts(/etc/cron.hourly)[1737194]: starting 0anacron
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,020.45122
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:40:01 oakrhelv001 CROND[1887644]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,020.451193
management_message
cisco_os
syslog
10.100.91.111
notice
<189>2364333: 10.234.70.129: Jul 26 13:36:54.992 CDT: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/41: PD removed
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,020.451165
management_message
cisco_os
syslog
10.100.91.111
notice
<189>2364332: 10.234.70.129: Jul 26 13:36:54.296 CDT: %ILPOWER-5-DETECT: Interface Gi1/0/41: Power Device detected: Cisco PD
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,020.451132
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:40:01 oakrhelv001 CROND[1887638]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,020.451108
pam_event
pam
syslog
host-0001.example.internal
notice
Dec 24 03:28:10 oakrhelv001 sshd[1461858]: pam_unix(sshd:session): session opened for user epicadm by (uid=0)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Linux PAM
Linux
1,722,019,020.451064
management_message
cisco_os
syslog
10.72.142.117
notice
<189>22450: 10.95.18.212: Jul 26 13:36:54.395 CDT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet4/0/25, changed state to up
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,019.450487
management_message
cisco_os
syslog
10.72.142.117
error
<187>22449: 10.95.18.212: Jul 26 13:36:53.395 CDT: %LINK-3-UPDOWN: Interface GigabitEthernet4/0/25, changed state to up
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,019.450469
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 6 12:25:01 oakrhelv001 CROND[1788471]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,019.450456
management_message
cisco_os
syslog
10.171.95.188
notice
<189>577858: LAVREP01: Jul 26 13:36:54.315 CDT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/29, changed state to up
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,019.450439
systemd_event
crond
syslog
host-0001.example.internal
notice
Jan 19 23:55:01 oakrhelv001 CROND[1997207]: (epicadm) CMD (if [ -f /epic/redalert/bin/ra_sched ]; then /epic/redalert/bin/ra_sched --monitor_scheduler > /dev/null 2>&1 ; fi)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,019.450424
management_message
cisco_os
syslog
10.171.95.188
error
<187>577857: LAVREP01: Jul 26 13:36:53.315 CDT: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/29, changed state to up
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
Cisco Network Operating System
Cisco
1,722,019,019.450413
unknown
no_useful_info
syslog
host-0001.example.internal
[2023-12-17T13:04:26.495Z] [ message] [vix] VixTools_ProcessVixCommand: command 186
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,019.450379
diagnostic_event
filebeat_diagnostic
syslog
host-0001.example.internal
informational
Dec 31 03:19:50 oakrhelv001 filebeat: 2023-12-31T03:19:50.779-0600#011INFO#011[publisher]#011pipeline/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,019.45036
auth_success
sshd
syslog
10.54.116.179
61104
host-0001.example.internal
USER-0001
notice
Jan 21 03:31:11 oakrhelv001 sshd[1770364]: Accepted password for epicadm from 10.248.113.130 port 61104 ssh2
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,019.450343
access_log
sshd
syslog
host-0001.example.internal
notice
Dec 24 03:28:11 oakrhelv001 sshd[1461747]: Received disconnect from 10.248.113.130 port 57072:11: Terminating connection
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
1,722,019,019.45031
systemd_event
crond
syslog
host-0001.example.internal
notice
Dec 30 20:00:01 oakrhelv001 CROND[3404690]: (root) CMD (/usr/lib64/sa/sa1 1 1)
benign
0.5
[]
[]
[]
0
none
Unprocessed
automated
false
[]
[]
[]
End of preview. Expand in Data Studio

WitFoo Precinct6 Cybersecurity Dataset (large)

Overview

A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by WitFoo Precinct version 6.x. This dataset contains 114,234,041 sanitized security events (signal logs) across 5 organizations and 12,361 incident provenance graphs (47,632 nodes, 32,086,552 edges).

Available in two sizes:

Generate your own: WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: witfoo/dataset-from-precinct6

This dataset is designed to support research in:

  • Provenance graph-based intrusion detection (KnowHow, NodLink, and similar systems)
  • AI-driven cyber defense simulation (CybORG and MARL-based defense policy training)
  • Security alert classification (malicious vs. suspicious vs. benign event labeling)
  • Attack lifecycle analysis using MITRE ATT&CK framework mappings
  • Detection rule evaluation using WitFoo's 261 lead detection rules

Quick Start

from datasets import load_dataset

# Load flat signal logs (114M rows across 58 Parquet shards)
signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")

# Find analyst-confirmed malicious events
malicious_confirmed = signals.filter(
    lambda x: x["label_binary"] == "malicious" and x["disposition"] == "Disrupted"
)

# Find suspicious events that matched detection rules but are not in confirmed incidents
suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")

# Load provenance graph (47.6k nodes, 32M edges)
nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")

# Load full incident graphs (12,361 incidents with embedded artifacts, leads, frameworks)
incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")

Label Distribution

Label Count Percentage
benign 113,543,372 99.40%
suspicious 616,605 0.54%
malicious 74,064 0.06%

Disposition breakdown (the raw Precinct status, exposed for ground-truth stratification — see Ground Truth):

Disposition Count Meaning
Unprocessed 114,192,640 No analyst review (default state for benign/suspicious + un-reviewed malicious)
Disrupted 41,391 SOC analyst confirmed and intervened
Dismissed 10 SOC analyst dismissed

Signal Columns

Column Type Description
timestamp float Unix epoch timestamp
message_type string Event classification (e.g., firewall_action, account_logon, AssumeRole)
stream_name string Source product/data stream
pipeline string Ingestion pipeline
src_ip string Source IP (sanitized)
dst_ip string Destination IP (sanitized)
src_port string Source port
dst_port string Destination port
protocol string Network protocol (6=TCP, 17=UDP, 1=ICMP)
src_host string Source hostname (sanitized)
dst_host string Destination hostname (sanitized)
username string Associated username (sanitized)
action string Event action (block, permit, logon, logoff)
severity string Severity level
vendor_code string Vendor-specific event code
message_sanitized string Full sanitized raw log message
label_binary string malicious, suspicious, or benign
label_confidence float Confidence score (0.0–1.0). See Scoring.
attack_techniques string JSON array of MITRE ATT&CK technique IDs (e.g., ["T1041","T1567"])
attack_tactics string JSON array of MITRE ATT&CK tactic IDs (TA0001-style)
defense_techniques string JSON array of MITRE D3FEND defense technique IDs
suspicion_score float WitFoo suspicion score (0.0–1.0). See Scoring.
mo_name string Modus operandi (e.g., Data Theft)
lifecycle_stage string Kill chain stage (e.g., initial-compromise, complete-mission)
disposition string Raw Precinct status (Disrupted, Investigating, Resolved, Dismissed, False Positive, Unprocessed)
disposition_category string Bucketed disposition (confirmed-malicious, false-positive, dismissed, automated)
is_false_positive bool True if SOC analyst marked the incident as a false positive
status_name string Same as disposition (raw Precinct status)
incident_ids string JSON array of incident UUIDs (empty for benign/suspicious)
matched_rules string JSON array of matched WitFoo lead rule descriptions
set_roles string JSON array of classification roles (e.g., Exploiting Host, C2 Server)
product_name string Security product name (e.g., ASA Firewall, Falcon)
vendor_name string Product vendor (e.g., Cisco, Crowdstrike)

Source Products

The dataset contains events from 158 security products across 70+ vendors. Complete catalog in reference/lead_rules_catalog.json.

Category Products
Firewalls Cisco ASA, Palo Alto PAN NGFW, Fortinet FortiGate, Checkpoint, Meraki, SonicWall, pfSense, Barracuda, Juniper SRX
Endpoint Protection CrowdStrike Falcon, Symantec SEP, Carbon Black, Cylance, SentinelOne, Deep Instinct, Sophos, McAfee, ESET
Network Detection Cisco Stealthwatch, Cisco Firepower, Suricata IDS, TippingPoint IPS, Vectra Cognito
Identity & Access Microsoft Windows AD, Cisco ISE, Centrify, CyberArk, Duo, Okta, Beyond Trust
Cloud Security AWS CloudTrail, AWS VPC Flow Logs, AWS GuardDuty, Azure Security, Zscaler, Netskope, Cisco Umbrella
Email Security ProofPoint, Mimecast, FireEye EX, Barracuda ESS, Cisco IronPort, Checkpoint Harmony
Threat Intelligence FireEye NX/HX/AX/CMS, Trend Micro, QRadar, Microsoft ATA, Cortex XDR
Infrastructure VMware vCenter/NSX, Elastic Filebeat, Linux (sshd, PAM, systemd, auditd), Apache, HAProxy

Labeling Methodology

Three-tier labels derived from two sources:

  • malicious (74,064): Events embedded as leads inside confirmed incidents. Extracted directly from incident lead objects with suspicion scores, modus operandi, and MITRE mappings.
  • suspicious (616,605): Events matching WitFoo's 261 lead detection rules but not present in confirmed incidents.
  • benign (113,543,372): Events not matching any detection rules and not in any incident.

Ground Truth and Disposition

All labels in this dataset are derived from WitFoo Precinct's automated incident correlation engine — there is no independent, analyst-verified ground truth. Researchers should treat Precinct's analysis as a strong but imperfect oracle. The disposition column lets you assess label quality on a per-record basis:

disposition Meaning Confidence in label
Disrupted SOC analyst confirmed the incident and intervened High — human-confirmed malicious
Investigating SOC analyst is actively investigating Medium — analyst engaged
Resolved SOC analyst confirmed and resolved High — human-confirmed malicious
Dismissed SOC analyst dismissed the incident Negative — analyst rejected
False Positive SOC analyst confirmed false positive Negative — analyst rejected
Unprocessed Automated detection, no human review Lower — Precinct-confidence only

The disposition_category column buckets these into four values for easier filtering: confirmed-malicious, false-positive, dismissed, automated. For experiments where ground-truth quality matters, restrict to records where disposition ∈ {Disrupted, Resolved} to compare against analyst-confirmed labels. This dataset has 41,391 records with Disrupted status, 10 with Dismissed, and the remainder with Unprocessed (no analyst review).

For benign and suspicious records, disposition is Unprocessed (no incident association). For malicious records, disposition reflects the parent incident's status at extraction time.

Scoring

The dataset exposes two related score fields:

  • suspicion_score (float, 0.0–1.0) — Precinct's proprietary suspicion score from the parent incident. Populated for malicious records; zero for benign and suspicious. (Previously this column was always 0 — that was a defaulting bug, now fixed.)

  • label_confidence (float, 0.0–1.0) — Confidence in the assigned label_binary tier. Computed deterministically from corroborating signal:

    Label Formula
    malicious max(0.6, suspicion_score) clamped to 0.95; lowered to 0.3 if is_false_positive
    suspicious 0.4 + 0.1 × n_matched_rules + 0.05 × n_set_roles, clamped to [0.5, 0.85]
    benign 0.5 (no positive evidence either way)

    Note: label_confidence is not the probability the activity is malicious — it indicates how much corroborating evidence supports the assigned tier. Source: src/precinct6_dataset/label.py.

MITRE ATT&CK Mappings

Attack technique and tactic labels are derived from three sources, with deduplication:

  1. WitFoo set role names attached to the incident (e.g., C2 ServerTA0011 Command and Control, T1071 Application Layer Protocol)
  2. Modus operandi name on the incident (e.g., RansomwareTA0001, TA0002, TA0040; T1486 Data Encrypted for Impact)
  3. Per-product framework data embedded in incident.nodes.products.frameworks (when present)

Tactic IDs use the standard MITRE ATT&CK Enterprise format (TA0001 through TA0043). Technique IDs are top-level techniques representing the most likely category for a given role. Researchers wanting precise per-event technique attribution should treat these as priors. Full mapping tables in src/precinct6_dataset/mitre_mapping.py.

Per-edge/per-node attribution in graph output: attack_tactics, attack_techniques, set_roles, lifecycle_stage, label_binary, label_confidence, suspicion_score, disposition are attached at the edge level in edges.jsonl and in per-incident GraphML files. Nodes in incidents.jsonl carry their own sets and products dicts with per-entity information.

Graph Data

Component Count
Nodes (artifact-derived hosts + credentials) 47,632
Edges (artifact EVENT/NETWORK_FLOW + incident INCIDENT_LINK) 32,086,552
Incidents 12,361

Per-edge labels in edges.jsonl include attack_techniques, attack_tactics, set_roles, lifecycle_stage, disposition, mo_name, suspicion_score, incident_id (for INCIDENT_LINK edges).

Attack Reports

graph/attack_reports.jsonl contains one natural-language threat-hunting report per incident (12,361 reports). Each report is deterministically composed from structured incident metadata (modus operandi, set roles, lead descriptions, MITRE mappings, timestamps) and explicitly states that it reflects Precinct's automated correlation engine output, not an independent threat-hunting investigation.

Each record contains: incident_id, report_text, mo_name, suspicion_score, disposition, attack_techniques, attack_tactics, lead_count, set_role_names, matched_rules, products_observed, lifecycle_stage, and timing fields.

Researchers can audit exactly how each sentence is derived by reading src/precinct6_dataset/attack_reports.py.

Additional Files

  • signals/signals-NNNNN.parquet — 58 Parquet shards (~270 MB each), 2M rows per shard except final shard. Total ~15.7 GB.
  • signals/metadata.json — Per-shard summary, label/disposition distributions, top message types and streams.
  • graph/nodes.jsonl — 47,632 graph nodes (hosts + credentials derived from artifact src/dst/username).
  • graph/edges.jsonl — 32,086,552 graph edges, each with labels dict carrying MITRE, disposition, set_roles, etc.
  • graph/incidents.jsonl — Full incident records (12,361 lines, ~638 MB) with embedded nodes, edges, leads, and framework mappings.
  • graph/incidents_graphml/{0-f}/{incident_id}.graphml12,361 per-incident GraphML files, sharded into 16 subdirectories by first hex char of the incident UUID (HuggingFace caps directories at 10,000 files). Each file is small (KB-MB) and loadable in Gephi, NetworkX, igraph, or DGL. Ideal for graph-based research where loading the entire dataset is impractical.
  • graph/attack_reports.jsonl — Natural-language threat-hunting reports (12,361 reports, ~21 MB). See Attack Reports.
  • reference/lead_rules_catalog.json — Complete catalog of 261 WitFoo lead detection rules, 158 security products, 106 classification sets, and 216 stream-to-product mappings.

Note on the artifact-level graph: With 32M edges, the monolithic graph.graphml is intentionally not shipped at this scale — per-incident GraphMLs and the streaming edges.jsonl are the recommended entry points. Methodology and content fields are otherwise identical to the 2M version.

Sanitization

All customer-identifying information has been removed through a comprehensive 4-layer sanitization pipeline. The pipeline is open source under the Apache 2.0 license.

  1. Structured field sanitization + Aho-Corasick multi-pattern sweep — Known fields are replaced with deterministic tokens (IPs → RFC 5737 ranges, hostnames → HOST-NNNN, etc.). Every record is then swept using an Aho-Corasick automaton built from 97,000+ PII registry entries.
  2. Format-specific log message parsing — Eight specialized parsers handle Cisco ASA syslog, Windows Security Event XML, WinLogBeat JSON, AWS CloudTrail, Palo Alto Networks, VMware vCenter, DNS logs, and a generic fallback.
  3. Machine learning residual detectionMicrosoft Presidio (spaCy NLP) and BERT NER scan for residual PII. New discoveries trigger full re-sanitization.
  4. Large language model contextual reviewClaude reviews stratified samples for subtle PII. Findings trigger re-sanitization.

The four layers run in cycles. PII discovered by ML/AI in one cycle is caught automatically by Layer 1 in all subsequent cycles. Final PII registry: 97,046 unique mappings across 13 categories (IPs, hostnames, usernames, orgs, credentials, SIDs, emails, ARNs, etc.). All replacements are consistent — the same original value always maps to the same token, preserving graph topology.

Research Context

This dataset was produced in collaboration with the University of Canterbury (New Zealand) Computer Science and Software Engineering department for two research projects:

  • AI Cyber-Security Battle Simulator — Improving CybORG with realistic IDS observations, graph-based defense policies, and AI-driven attacker modeling
  • Intrusion Detection based on Provenance Graphs — Evaluating reproducibility and generalizability of KnowHow and NodLink detection methods

Limitations

  • Label imbalance: 99.40% benign reflects production SOC reality. Sampling strategies needed for balanced training.
  • Temporal scope: July–August 2024.
  • Ground truth: All labels derive from Precinct's automated correlation. Use the disposition column to stratify by analyst review level.
  • Shared incidents: The same 12,361 incidents appear in both the 2M and this dataset (incidents are stored separately from signal data; only the signal sample size differs).
  • Sanitization trade-offs: Some log message detail is reduced by PII replacement, particularly in free-text fields.

Citation

@dataset{witfoo_precinct6_100m_2026,
  title={WitFoo Precinct6 Cybersecurity Dataset (large)},
  author={WitFoo, Inc.},
  year={2026},
  url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
  license={Apache-2.0}
}

License

Apache License 2.0

Downloads last month
2,743