sigma-specification

Sigma Taxonomy

The following document defines the field names and log sources that are allowed to be used in SIGMA rules that are shared on the official SigmaHQ repository.

Summary

Log Sources

For a better comprehension, the log sources are organized by directory name similar to the rules structure in the SIGMA project.

Application Folder

The application folder contains rules that are intended for application security monitoring. The rules are organized into folders per application technology. All rules define log sources as follows:

Because application logs are often ingested as raw text events with poor decomposition into fields by many target systems, these rules are keyword rules that don’t match on specific fields.

Django

Product Logsource Event
django category: application
product: django
 

Python

Product Logsource Event
python category: application
product: python
 

RPC Firewall

Product Logsource Event
rpc_firewall category: application
product: rpc_firewall
 

Ruby on Rails

Product Logsource Event
ruby_on_rails category: application
product: ruby_on_rails
 

Spring Framework

Product Logsource Event
spring category: application
product: spring
 

SQL

Product Logsource Event
sql category: application
product: sql
 

Category Folder

Product Logsource Event
  category: antivirus antivirus detection message (format depends on the editor)
  category: database sql queries log (drop, select,…)

Cloud Folder

AWS

Product Logsource Event
Aws product: aws
service: cloudtrail
 

Azure

Product Logsource Event
Azure product: azure
service: activitylogs
 
Azure product: azure
service: auditlogs
 
Azure product: azure
service: riskdetection
 
Azure product: azure
service: pim
 
Azure product: azure
service: signinlogs
 

Bitbucket

Product Logsource Event
Bitbucket product: bitbucket
service: audit
 

Cisco

Product Logsource Event
Cisco product: cisco
service: duo
 

GCP

Product Logsource Event
GCP product: gcp
service: gcp.audit
 
GCP product: gcp
service: google_workspace.admin
 

Github

Product Logsource Event
Github product: github
service: audit
organization Audit log

M365

Product Logsource Event
M365 product: m365
service: audit
 
M365 product: m365
service: exchange
 
M365 product: m365
service: threat_detection
 
M365 product: m365
service: threat_management
 

Okta

Product Logsource Event
Okta product: okta
service: okta
 

OneLogin

Product Logsource Event
Onelogin product: onelogin
service: onelogin.events
 

Linux Folder

Category

Product Logsource Event
Linux product: linux
category: file_event
EventID: 11
service: sysmon
Linux product: linux
category: network_connection
EventID: 3
service: sysmon
Linux product: linux
category: process_creation
EventID: 1
service: sysmon

Service

Product Logsource Event
Linux product: linux
service: auditd
auditd.log
Linux product: linux
service: auth
auth.log
Linux product: linux
service: clamav
 
Linux product: linux
service: cron
 
Linux product: linux
service: guacamole
 
Linux product: linux
service: sudo
 
Linux product: linux
service: sshd
 
Linux product: linux
service: syslog
 
Linux product: linux
service: vsftpd
 

Macos Folder

Category

Product Logsource Event
Macos product: macos
category: file_event
 
Macos product: macos
category: process_creation
 

Network Folder

Cisco

Product Logsource Description
Cisco product: cisco
service: aaa
 
Cisco product: cisco
service: bgp
 
Cisco product: cisco
service: ldp
 

Huawei

Product Logsource Description
Huawei product: huawei
service: ldp
 

Juniper

Product Logsource Description
Juniper product: juniper
service: ldp
 

Zeek

Product Logsource Description
Zeek product: zeek
service: dce_rpc
 
Zeek product: zeek
service: dns
 
Zeek product: zeek
service: http
 
Zeek product: zeek
service: kerberos
 
Zeek product: zeek
service: rdp
 
Zeek product: zeek
service: smb_files
 
Zeek product: zeek
service: x509
 

Other

Product Logsource Description
N/A category: dns  
N/A category: firewall  
N/A category: proxy  
N/A category: webserver  

Product Folder

Product Logsource Event
Apache service: apache Application error.log
Modsecurity product: modsecurity  

Windows Folder

Category

Product Logsource Description
windows product: windows
category: process_creation
EventID: 1
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_change
EventID: 2
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: network_connection
EventID: 3
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: sysmon_status
EventIDs:
- 4
- 16
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: process_termination
EventID: 5
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: driver_load
EventID: 6
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: image_load
EventID: 7
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: create_remote_thread
EventID: 8
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: raw_access_thread
EventID: 9
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: process_access
EventID: 10
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_event
EventID: 11
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_event
EventID:
- 12
- 13
- 14
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_add
EventID: 12
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_delete
EventID: 12
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_set
EventID: 13
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_rename
EventID: 14
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: create_stream_hash
EventID: 15
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: pipe_created
EventIDs:
- 17
- 18
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: wmi_event
EventIDs:
- 19
- 20
- 21
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: dns_query
EventID: 22
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_delete
EventID: 23
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: clipboard_capture
EventID: 24
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: process_tampering
EventID: 25
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_delete_detected
EventID: 26
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_block_executable
EventID: 27
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_block_shredding
EventID: 28
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_executable_detected
EventID: 29
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: sysmon_error
EventID: 255
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_access
ETW Provider: Microsoft-Windows-Kernel-File
windows product: windows
category: ps_classic_start
EventID: 400
Channel: Windows PowerShell
windows product: windows
category: ps_classic_provider_start
EventID: 600
Channel: Windows PowerShell
windows product: windows
category: ps_classic_script
EventID: 800
Channel: Windows PowerShell
windows product: windows
category: ps_module
EventID: 4103
Channel:
- Microsoft-Windows-PowerShell/Operational
- PowerShellCore/Operational
windows product: windows
category: ps_script
EventID: 4104
Channel:
- Microsoft-Windows-PowerShell/Operational
- PowerShellCore/Operational
windows product: windows
category: file_rename
ETW Provider: Microsoft-Windows-Kernel-File

Service

Product Logsource Description
windows product: windows
service: application
Channel: Application
windows product: windows
service: application-experience
Channel:
- Microsoft-Windows-Application-Experience/Program-Telemetry
- Microsoft-Windows-Application-Experience/Program-Compatibility-Assistant
windows product: windows
service: applocker
Channel:
- Microsoft-Windows-AppLocker/MSI and Script
- Microsoft-Windows-AppLocker/EXE and DLL
- Microsoft-Windows-AppLocker/Packaged app-Deployment
- Microsoft-Windows-AppLocker/Packaged app-Execution
windows product: windows
service: appmodel-runtime
Channel: Microsoft-Windows-AppModel-Runtime/Admin
windows product: windows
service: appxdeployment-server
Channel: Microsoft-Windows-AppXDeploymentServer/Operational
windows product: windows
service: appxpackaging-om
Channel: Microsoft-Windows-AppxPackaging/Operational
windows product: windows
service: bitlocker
Channel: Microsoft-Windows-BitLocker/BitLocker Management
windows product: windows
service: bits-client
Channel: Microsoft-Windows-Bits-Client/Operational
windows product: windows
service: capi2
Channel: Microsoft-Windows-CAPI2/Operational
windows product: windows
service: certificateservicesclient-lifecycle-system
Channel: Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational
windows product: windows
service: codeintegrity-operational
Channel: Microsoft-Windows-CodeIntegrity/Operational
windows product: windows
service: dhcp
Channel: Microsoft-Windows-DHCP-Server/Operational
windows product: windows
service: diagnosis-scripted
Channel: Microsoft-Windows-Diagnosis-Scripted/Operational
windows product: windows
service: dns-client
Channel: Microsoft-Windows-DNS Client Events/Operational
windows product: windows
service: dns-server
Channel: DNS Server
windows product: windows
service: dns-server-analytic
Channel: Microsoft-Windows-DNS-Server/Analytical
windows product: windows
service: dns-server-audit
Channel: Microsoft-Windows-DNS-Server/Audit
windows product: windows
service: driver-framework
Channel: Microsoft-Windows-DriverFrameworks-UserMode/Operational
windows product: windows
service: firewall-as
Channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
windows product: windows
service: hyper-v-worker
Channel: Microsoft-Windows-Hyper-V-Worker
windows product: windows
service: iis-configuration
Channel: Microsoft-IIS-Configuration/Operational
windows product: windows
service: kernel-event-tracing
Channel: Microsoft-Windows-Kernel-EventTracing
windows product: windows
service: kernel-shimengine
Channel:
- Microsoft-Windows-Kernel-ShimEngine/Operational
- WinEventLog:Microsoft-Windows-Kernel-ShimEngine/Diagnostic
windows product: windows
service: ldap
Channel: Microsoft-Windows-LDAP-Client/Debug
windows product: windows
service: lsa-server
Channel: Microsoft-Windows-LSA/Operational
windows product: windows
service: msexchange-management
Channel: MSExchange Management
windows product: windows
service: ntfs
Channel: Microsoft-Windows-Ntfs/Operational
windows product: windows
service: ntlm
Channel: Microsoft-Windows-NTLM/Operational
windows product: windows
service: openssh
Channel: OpenSSH/Operational
windows product: windows
service: powershell
Channel: Microsoft-Windows-PowerShell/Operational
windows product: windows
service: powershell-classic
Channel: Windows PowerShell
windows product: windows
service: printservice-admin
Channel: Microsoft-Windows-PrintService/Admin
windows product: windows
service: printservice-operational
Channel: Microsoft-Windows-PrintService/Operational
windows product: windows
service: security
Channel: Security
windows product: windows
service: security-mitigations
Channel:
- Microsoft-Windows-Security-Mitigations/Kernel Mode
- Microsoft-Windows-Security-Mitigations/User Mode
windows product: windows
service: sense
Channel: Microsoft-Windows-SENSE/Operational
windows product: windows
service: servicebus-client
Channel:
- Microsoft-ServiceBus-Client/Operational
- Microsoft-ServiceBus-Client/Admin
windows product: windows
service: shell-core
Channel: Microsoft-Windows-Shell-Core/Operational
windows product: windows
service: smbclient-security
Channel: Microsoft-Windows-SmbClient/Security
windows product: windows
service: sysmon
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
service: system
Channel: System
windows product: windows
service: taskscheduler
Channel: Microsoft-Windows-TaskScheduler/Operational
windows product: windows
service: terminalservices-localsessionmanager
Channel: Microsoft-Windows-TerminalServices-LocalSessionManager/Operational
windows product: windows
service: vhdmp
Channel: Microsoft-Windows-VHDMP/Operational
windows product: windows
service: windefend
Channel: Microsoft-Windows-Windows Defender/Operational
windows product: windows
service: wmi
Channel: Microsoft-Windows-WMI-Activity/Operational

Fields

Generic

Process Creation Events

Process creation events can be defined with the generic log source category process_creation. The event scope can be further restricted with product. Example for a process creation event log source restricted to Windows:

category: process_creation
product: windows

The field names follow the field names used in Sysmon events:

Field Name Example Value Comment
UtcTime 2019-03-02 08:51:00.008  
ProcessGuid {c1b49677-43f4-5c7a-0000-0010d3dd8044}  
ProcessId 1028  
Image C:\Program Files (x86)\Google\Update\GoogleUpdate.exe  
FileVersion 1.3.28.13  
Description Google Installer  
Product Google Update  
Company Google Inc.  
CommandLine “C:\Program Files (x86)\Google\Update\GoogleUpdate.exe” /ua /installsource scheduler  
CurrentDirectory C:\Windows\system32|  
User NT AUTHORITY\SYSTEM  
LogonGuid {c1b49677-3fb9-5c09-0000-0020e7030000}  
LogonId 0x3e7  
TerminalSessionId 0  
IntegrityLevel System  
imphash E96A73C7BF33A464C510EDE582318BF2  
md5 CCF1D1573F175299ADE01C07791A6541  
sha1 0AE1F9071C5E8FE4A69D3F671937935D242D8A6C  
sha256 68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2  
ParentProcessGuid {c1b49677-6b43-5c78-0000-00107fb77544}  
ParentProcessId 1724  
ParentImage C:\Windows\System32\taskeng.exe  
ParentCommandLine taskeng.exe {88F94E5C-5DC3-4606-AEFA-BDCA976D6113} S-1-5-18:NT AUTHORITY\System:Service:  

Other Generic Rule Categories

We align our field names to the field names that Sysmon uses. You can find all possible field values in the Sysmon Community Guide and on UltimateWindowsSecurity.com.

Specific

History