SlideShare a Scribd company logo
HOW TO CREATE
CORRELATION RULE FOR
THREAT DETECTION
IN RUSIEM
CEO RuSIEM
Olesya Shelestova
https://rusiem.com
support@rusiem.com
In case - detection ransomware
Win32/Diskcoder.Petya.C
EXAMPLE THREAT
• Consider as an example a real threat:
Ransomware Win32/Diskcoder.Petya.C
• You can not rely on patches that cover a vulnerability when
creating a correlation rule.
• At any time, a host may appear on which the patch is not
installed. And you will not know about it at the most
inopportune moment
WHAT ARE YOU NEED?
• Discover. Even if at the moment you do not have a threat.
• Automatic detection
• Real time detection
• Notifications (email/incident in workflow)
WHAT YOU NEED TO UNDERSTAND FIRST
Threat:
• Attack vectors (vulnerability, local/network, exploited software
versions, …)
• Distribution method (email/attachments/network/banners/sites)
• Explore news for threat definition/signature
How to detect:
• Process/network/hash
• Event logs/Cyber security systems (IDS/DPI/Network
Analyzers/Antivirus/etc)
SCENARIO #1
1. You have an information security tool that detects a threat
2. SIEM receives a ready-made threat decision event
3. SIEM prioritizes the threat by the rule of correlation, reduce
the number of false positives and records the fact of the
incident. Notifies send to you (or remediation group) by mail.
SCENARIO #2
1. You have a number of different software or hardware tools that
provide information about processes, email, network connections,
hashes.
2. It can be: windows event logs, firewalls, syslog, IDS, flow, network
analyzers and other.
3. SIEM will receive simple events from these sources, check for
correlations and detect incidents.
4. SIEM prioritizes the threat by the rule of correlation, reduce the
number of false positives and records the fact of the incident.
Notifies send to you (or remediation group) by mail.
DIFFERENCE BETWEEN SCENARIO
1. In fact: you are faster than IDS / AV vendors can create a signature
yourself.
2. The difference between the #1 and #2 scenarios is that in the case
of correlation rules in SIEM, you get a more manageable centralized
system.
3. There is no need to write rules for many different systems and
monitor their deploy.
4. In practice, SIEM receives much more information for guaranteed
threat detection.
5. In SIEM correlation rules it is possible to reduce the number of false
positives.
6. In any case, processes of incident management and real-time
response are needed. This does not have a classic protection
LOOK GOOGLE FOR THREAT
Win32/Diskcoder.Pety
a.C
Process
Remote WMI, “process call create
"C:WindowsSystem32rundll32.exe
"C:Windowsperfc.dat" #1”
Email
src/dst
Connect to
hosts
mshta.exe
%WINDIR%System32ms
hta.exe"
"C:myguy.xls.hta"
185.165.29.78
84.200.16.242
111.90.139.247
95.141.115.108
wowsmith123456@posteo.net
iva76y3pr@outlook.com
carmellar4hegp@outlook.com
amanda44i8sq@outlook.com
OUR PATH
• We will detect Win32/Diskcoder.Petya in this case by dst.ip
(C&C) and sha1/sha256 hashes
• Arrays of values put in the lists to be able to quickly change
and add new values
• When IDSs are updated - we will record incidents and by their
warnings
• If you have enabled audit on file servers – we also may create
common rule. Example, “changes 100 or more files in 60
seconds”
CREATE LIST FOR IP ADDRESSES
CREATE LIST FOR SHA1 AND SHA256 HASHES
CREATE CORRELATION RULE FOR DETECT
BY HASH
CREATE RULE FOR DETECTION BY DST.IP
ATTENTION !
• Be sure to test the created rule in a real infrastructure !
• You can always create or emulate the connection, the test
process, the other symptom of the threat for verification
• If an incident happens - it will be too late.
TEST THE CREATED RULE, CHECK THE INCIDENT
THANK YOU
support@rusiem.com
https://rusiem.com
https://t.me/rusiem
https://facebook.com/rvsiem Tags: #rvsiem #rusiem
Software: RuSIEM, free RvSIEM

More Related Content

PPTX
RuSIEM IT assets
PPTX
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
PPTX
OSSIM User Training: Get Improved Security Visibility with OSSIM
PPTX
Best Practices for Configuring Your OSSIM Installation
PPTX
Integrated Tools in OSSIM
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PDF
Linux Security for Developers
RuSIEM IT assets
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Get Improved Security Visibility with OSSIM
Best Practices for Configuring Your OSSIM Installation
Integrated Tools in OSSIM
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
Linux Security for Developers

What's hot (20)

PPTX
Advanced OSSEC Training: Integration Strategies for Open Source Security
PPTX
Configuring Data Sources in AlienVault
PPTX
Whats New in OSSIM v2.2?
PDF
Alien vault _policymanagement
PDF
Log correlation SIEM rule examples and correlation engine performance data
PPTX
Locking Down Your Cloud
PDF
Implementing ossec
PPTX
Solving the Open Source Security Puzzle
PPTX
Continuous monitoring with OSSIM
PPTX
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
PDF
Windows server hardening 1
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
ODP
Hardening Database Server
ODP
Web Application Firewall
PDF
Mod Security
PDF
SureLog SIEM
PPTX
Mod security
PPTX
Web Application firewall-Mod security
PDF
Aws security with HIDS, OSSEC
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
Advanced OSSEC Training: Integration Strategies for Open Source Security
Configuring Data Sources in AlienVault
Whats New in OSSIM v2.2?
Alien vault _policymanagement
Log correlation SIEM rule examples and correlation engine performance data
Locking Down Your Cloud
Implementing ossec
Solving the Open Source Security Puzzle
Continuous monitoring with OSSIM
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Windows server hardening 1
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Hardening Database Server
Web Application Firewall
Mod Security
SureLog SIEM
Mod security
Web Application firewall-Mod security
Aws security with HIDS, OSSEC
Improve Threat Detection with OSSEC and AlienVault USM
Ad

Similar to How to create correlation rule for threat detection in RuSIEM (20)

DOCX
Context Driven Scalable SIEM Solution
PPTX
Beginner's Guide to SIEM
PPTX
SIEM 101: Get a Clue About IT Security Analysis
PDF
SIEM for Beginners
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
SIEM : Security Information and Event Management
PPTX
RuSIEM overview (english version)
PPTX
SIEM - Your Complete IT Security Arsenal
PPTX
CryptTech 2015
PDF
Need Of Security Operations Over SIEM
DOC
Security Event Analysis Through Correlation
PPTX
RuSIEM vs SOC (En)
PPTX
Security Information Event Management - nullhyd
PPTX
SIEM - Activating Defense through Response by Ankur Vats
PPTX
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
PDF
Why SureLog?
PDF
SureLog intelligent response
PDF
Changing the Security Monitoring Status Quo
 
PPTX
Correlog Overview Presentation
PPTX
KS - Introduction to System Information and Security Management (SIEM).pptx
Context Driven Scalable SIEM Solution
Beginner's Guide to SIEM
SIEM 101: Get a Clue About IT Security Analysis
SIEM for Beginners
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM : Security Information and Event Management
RuSIEM overview (english version)
SIEM - Your Complete IT Security Arsenal
CryptTech 2015
Need Of Security Operations Over SIEM
Security Event Analysis Through Correlation
RuSIEM vs SOC (En)
Security Information Event Management - nullhyd
SIEM - Activating Defense through Response by Ankur Vats
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Why SureLog?
SureLog intelligent response
Changing the Security Monitoring Status Quo
 
Correlog Overview Presentation
KS - Introduction to System Information and Security Management (SIEM).pptx
Ad

More from Olesya Shelestova (15)

PPTX
Руководство по формату событий для разработчиков
PPTX
RuSIEM vs SOC (Rus)
PPTX
RuSiem events collection and forwarding
PPTX
From SIEM to Business processes
PPTX
Deploy RvSIEM (eng)
PPTX
Free RvSIEM. Intro (Rus)
PPTX
Rusiem 2017_обзор
PPTX
SIEM use cases - как их написать
PPTX
Корреляция в SIEM системах
PPTX
SIEM для ИТ
PPTX
RuSIEM. Потребители. Состав продукта. Отличия. Применение.
PPTX
RuSIEM 2016
PPTX
RuSIEM (15.11.2015)
PPTX
PPTX
автоматизируем пентест Wifi сети
Руководство по формату событий для разработчиков
RuSIEM vs SOC (Rus)
RuSiem events collection and forwarding
From SIEM to Business processes
Deploy RvSIEM (eng)
Free RvSIEM. Intro (Rus)
Rusiem 2017_обзор
SIEM use cases - как их написать
Корреляция в SIEM системах
SIEM для ИТ
RuSIEM. Потребители. Состав продукта. Отличия. Применение.
RuSIEM 2016
RuSIEM (15.11.2015)
автоматизируем пентест Wifi сети

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Digital Strategies for Manufacturing Companies
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Transform Your Business with a Software ERP System
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Upgrade and Innovation Strategies for SAP ERP Customers
Digital Strategies for Manufacturing Companies
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
How to Migrate SBCGlobal Email to Yahoo Easily
Design an Analysis of Algorithms II-SECS-1021-03
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
How Creative Agencies Leverage Project Management Software.pdf
L1 - Introduction to python Backend.pptx
2025 Textile ERP Trends: SAP, Odoo & Oracle
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Operating system designcfffgfgggggggvggggggggg
PTS Company Brochure 2025 (1).pdf.......
Softaken Excel to vCard Converter Software.pdf
Odoo Companies in India – Driving Business Transformation.pdf
Transform Your Business with a Software ERP System
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Design an Analysis of Algorithms I-SECS-1021-03
ManageIQ - Sprint 268 Review - Slide Deck

How to create correlation rule for threat detection in RuSIEM

  • 1. HOW TO CREATE CORRELATION RULE FOR THREAT DETECTION IN RUSIEM CEO RuSIEM Olesya Shelestova https://rusiem.com support@rusiem.com In case - detection ransomware Win32/Diskcoder.Petya.C
  • 2. EXAMPLE THREAT • Consider as an example a real threat: Ransomware Win32/Diskcoder.Petya.C
  • 3. • You can not rely on patches that cover a vulnerability when creating a correlation rule. • At any time, a host may appear on which the patch is not installed. And you will not know about it at the most inopportune moment
  • 4. WHAT ARE YOU NEED? • Discover. Even if at the moment you do not have a threat. • Automatic detection • Real time detection • Notifications (email/incident in workflow)
  • 5. WHAT YOU NEED TO UNDERSTAND FIRST Threat: • Attack vectors (vulnerability, local/network, exploited software versions, …) • Distribution method (email/attachments/network/banners/sites) • Explore news for threat definition/signature How to detect: • Process/network/hash • Event logs/Cyber security systems (IDS/DPI/Network Analyzers/Antivirus/etc)
  • 6. SCENARIO #1 1. You have an information security tool that detects a threat 2. SIEM receives a ready-made threat decision event 3. SIEM prioritizes the threat by the rule of correlation, reduce the number of false positives and records the fact of the incident. Notifies send to you (or remediation group) by mail.
  • 7. SCENARIO #2 1. You have a number of different software or hardware tools that provide information about processes, email, network connections, hashes. 2. It can be: windows event logs, firewalls, syslog, IDS, flow, network analyzers and other. 3. SIEM will receive simple events from these sources, check for correlations and detect incidents. 4. SIEM prioritizes the threat by the rule of correlation, reduce the number of false positives and records the fact of the incident. Notifies send to you (or remediation group) by mail.
  • 8. DIFFERENCE BETWEEN SCENARIO 1. In fact: you are faster than IDS / AV vendors can create a signature yourself. 2. The difference between the #1 and #2 scenarios is that in the case of correlation rules in SIEM, you get a more manageable centralized system. 3. There is no need to write rules for many different systems and monitor their deploy. 4. In practice, SIEM receives much more information for guaranteed threat detection. 5. In SIEM correlation rules it is possible to reduce the number of false positives. 6. In any case, processes of incident management and real-time response are needed. This does not have a classic protection
  • 9. LOOK GOOGLE FOR THREAT Win32/Diskcoder.Pety a.C Process Remote WMI, “process call create "C:WindowsSystem32rundll32.exe "C:Windowsperfc.dat" #1” Email src/dst Connect to hosts mshta.exe %WINDIR%System32ms hta.exe" "C:myguy.xls.hta" 185.165.29.78 84.200.16.242 111.90.139.247 95.141.115.108 wowsmith123456@posteo.net iva76y3pr@outlook.com carmellar4hegp@outlook.com amanda44i8sq@outlook.com
  • 10. OUR PATH • We will detect Win32/Diskcoder.Petya in this case by dst.ip (C&C) and sha1/sha256 hashes • Arrays of values put in the lists to be able to quickly change and add new values • When IDSs are updated - we will record incidents and by their warnings • If you have enabled audit on file servers – we also may create common rule. Example, “changes 100 or more files in 60 seconds”
  • 11. CREATE LIST FOR IP ADDRESSES
  • 12. CREATE LIST FOR SHA1 AND SHA256 HASHES
  • 13. CREATE CORRELATION RULE FOR DETECT BY HASH
  • 14. CREATE RULE FOR DETECTION BY DST.IP
  • 15. ATTENTION ! • Be sure to test the created rule in a real infrastructure ! • You can always create or emulate the connection, the test process, the other symptom of the threat for verification • If an incident happens - it will be too late.
  • 16. TEST THE CREATED RULE, CHECK THE INCIDENT