Hi Furkan,
There are several ways to correlate Wazuh alerts:
- You can use
if_sid in a rule to execute it only if the event that generates it matches the requirements of another rule. In the following example rule 5 will only be executed if the event matches the rule 4:
<rule id="5" level="10">
<if_sid>4</if_sid>
<match>AUTHENTICATE LOGIN failure</match>
<description>Login failed.</description>
<group>authentication_failed</group>
</rule>
- You can use
if_matching_sid to trigger an alert if another rule has been executed several times in a time interval. In the following example, rule 5 will only be executed if rule 4 has been executed 10 times in the last 120 seconds. You can add attributes like same_source_ip to not have alerts with different IP.
<rule id="5" level="10" frequency="10" timeframe="120">
<if_matched_sid>4</if_matched_sid>
<same_source_ip/>
<match>AUTHENTICATE LOGIN failure</match>
<description>Login failed.</description>
<group>authentication_failed</group>
</rule>
Is this correlation enough for your use case? If not, describe it and we can help you.
Currently Wazuh has no integration with the Sigma project. However, you can easily make an integration using Integratord. In
this article you can find an example on how to do it.
Best regards,
Cristobal Lopez.
On Friday, May 17, 2019 at 3:56:17 PM UTC+2, Furkan Sayım wrote:How can I write a correlation for Wazuh alarms?
On Friday, May 17, 2019 at 3:56:17 PM UTC+2, Furkan Sayım wrote: