The following document defines the field names and log sources that are allowed to be used in SIGMA rules that are shared on the official SigmaHQ repository.
For a better comprehension, the log sources are organized by directory name similar to the rules structure in the SIGMA project.
The application folder contains rules that are intended for application security monitoring. The rules are organized into folders per application technology. All rules define log sources as follows:
The category log source attribute is set to application
. This can be used by processing pipelines to create a technology-agnostic conversion configuration in cases where the application technology stack is unknown.
The product log source attribute is set to the name of the technology and should be equal to the folder name.
Because application logs are often ingested as raw text events with poor decomposition into fields by many target systems, these rules are keyword rules that don’t match on specific fields.
Product | Logsource | Event |
---|---|---|
django | category: application product: django |
Product | Logsource | Event |
---|---|---|
python | category: application product: python |
Product | Logsource | Event |
---|---|---|
rpc_firewall | category: application product: rpc_firewall |
Product | Logsource | Event |
---|---|---|
ruby_on_rails | category: application product: ruby_on_rails |
Product | Logsource | Event |
---|---|---|
spring | category: application product: spring |
Product | Logsource | Event |
---|---|---|
sql | category: application product: sql |
Product | Logsource | Event |
---|---|---|
category: antivirus | antivirus detection message (format depends on the editor) | |
category: database | sql queries log (drop, select,…) |
Product | Logsource | Event |
---|---|---|
Aws | product: aws service: cloudtrail |
Product | Logsource | Event |
---|---|---|
Azure | product: azure service: activitylogs |
|
Azure | product: azure service: auditlogs |
|
Azure | product: azure service: riskdetection |
|
Azure | product: azure service: pim |
|
Azure | product: azure service: signinlogs |
Product | Logsource | Event |
---|---|---|
Bitbucket | product: bitbucket service: audit |
Product | Logsource | Event |
---|---|---|
Cisco | product: cisco service: duo |
Product | Logsource | Event |
---|---|---|
GCP | product: gcp service: gcp.audit |
|
GCP | product: gcp service: google_workspace.admin |
Product | Logsource | Event |
---|---|---|
Github | product: github service: audit |
organization Audit log |
Product | Logsource | Event |
---|---|---|
M365 | product: m365 service: audit |
|
M365 | product: m365 service: exchange |
|
M365 | product: m365 service: threat_detection |
|
M365 | product: m365 service: threat_management |
Product | Logsource | Event |
---|---|---|
Okta | product: okta service: okta |
Product | Logsource | Event |
---|---|---|
Onelogin | product: onelogin service: onelogin.events |
Product | Logsource | Event |
---|---|---|
Linux | product: linux category: file_event |
EventID: 11 service: sysmon |
Linux | product: linux category: network_connection |
EventID: 3 service: sysmon |
Linux | product: linux category: process_creation |
EventID: 1 service: sysmon |
Product | Logsource | Event |
---|---|---|
Linux | product: linux service: auditd |
auditd.log |
Linux | product: linux service: auth |
auth.log |
Linux | product: linux service: clamav |
|
Linux | product: linux service: cron |
|
Linux | product: linux service: guacamole |
|
Linux | product: linux service: sudo |
|
Linux | product: linux service: sshd |
|
Linux | product: linux service: syslog |
|
Linux | product: linux service: vsftpd |
Product | Logsource | Event |
---|---|---|
Macos | product: macos category: file_event |
|
Macos | product: macos category: process_creation |
Product | Logsource | Description |
---|---|---|
Cisco | product: cisco service: aaa |
|
Cisco | product: cisco service: bgp |
|
Cisco | product: cisco service: ldp |
Product | Logsource | Description |
---|---|---|
Huawei | product: huawei service: ldp |
Product | Logsource | Description |
---|---|---|
Juniper | product: juniper service: ldp |
Product | Logsource | Description |
---|---|---|
Zeek | product: zeek service: dce_rpc |
|
Zeek | product: zeek service: dns |
|
Zeek | product: zeek service: http |
|
Zeek | product: zeek service: kerberos |
|
Zeek | product: zeek service: rdp |
|
Zeek | product: zeek service: smb_files |
|
Zeek | product: zeek service: x509 |
Product | Logsource | Description |
---|---|---|
N/A | category: dns | |
N/A | category: firewall | |
N/A | category: proxy | |
N/A | category: webserver |
Product | Logsource | Event |
---|---|---|
Apache | service: apache | Application error.log |
Modsecurity | product: modsecurity |
Product | Logsource | Description |
---|---|---|
windows | product: windows category: process_creation |
EventID: 1 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_change |
EventID: 2 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: network_connection |
EventID: 3 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: sysmon_status |
EventIDs: - 4 - 16 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: process_termination |
EventID: 5 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: driver_load |
EventID: 6 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: image_load |
EventID: 7 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: create_remote_thread |
EventID: 8 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: raw_access_thread |
EventID: 9 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: process_access |
EventID: 10 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_event |
EventID: 11 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_event |
EventID: - 12 - 13 - 14 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_add |
EventID: 12 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_delete |
EventID: 12 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_set |
EventID: 13 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_rename |
EventID: 14 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: create_stream_hash |
EventID: 15 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: pipe_created |
EventIDs: - 17 - 18 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: wmi_event |
EventIDs: - 19 - 20 - 21 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: dns_query |
EventID: 22 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_delete |
EventID: 23 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: clipboard_capture |
EventID: 24 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: process_tampering |
EventID: 25 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_delete_detected |
EventID: 26 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_block_executable |
EventID: 27 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_block_shredding |
EventID: 28 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_executable_detected |
EventID: 29 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: sysmon_error |
EventID: 255 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_access |
ETW Provider: Microsoft-Windows-Kernel-File |
windows | product: windows category: ps_classic_start |
EventID: 400 Channel: Windows PowerShell |
windows | product: windows category: ps_classic_provider_start |
EventID: 600 Channel: Windows PowerShell |
windows | product: windows category: ps_classic_script |
EventID: 800 Channel: Windows PowerShell |
windows | product: windows category: ps_module |
EventID: 4103 Channel: - Microsoft-Windows-PowerShell/Operational - PowerShellCore/Operational |
windows | product: windows category: ps_script |
EventID: 4104 Channel: - Microsoft-Windows-PowerShell/Operational - PowerShellCore/Operational |
windows | product: windows category: file_rename |
ETW Provider: Microsoft-Windows-Kernel-File |
Product | Logsource | Description |
---|---|---|
windows | product: windows service: application |
Channel: Application |
windows | product: windows service: application-experience |
Channel: - Microsoft-Windows-Application-Experience/Program-Telemetry - Microsoft-Windows-Application-Experience/Program-Compatibility-Assistant |
windows | product: windows service: applocker |
Channel: - Microsoft-Windows-AppLocker/MSI and Script - Microsoft-Windows-AppLocker/EXE and DLL - Microsoft-Windows-AppLocker/Packaged app-Deployment - Microsoft-Windows-AppLocker/Packaged app-Execution |
windows | product: windows service: appmodel-runtime |
Channel: Microsoft-Windows-AppModel-Runtime/Admin |
windows | product: windows service: appxdeployment-server |
Channel: Microsoft-Windows-AppXDeploymentServer/Operational |
windows | product: windows service: appxpackaging-om |
Channel: Microsoft-Windows-AppxPackaging/Operational |
windows | product: windows service: bitlocker |
Channel: Microsoft-Windows-BitLocker/BitLocker Management |
windows | product: windows service: bits-client |
Channel: Microsoft-Windows-Bits-Client/Operational |
windows | product: windows service: capi2 |
Channel: Microsoft-Windows-CAPI2/Operational |
windows | product: windows service: certificateservicesclient-lifecycle-system |
Channel: Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational |
windows | product: windows service: codeintegrity-operational |
Channel: Microsoft-Windows-CodeIntegrity/Operational |
windows | product: windows service: dhcp |
Channel: Microsoft-Windows-DHCP-Server/Operational |
windows | product: windows service: diagnosis-scripted |
Channel: Microsoft-Windows-Diagnosis-Scripted/Operational |
windows | product: windows service: dns-client |
Channel: Microsoft-Windows-DNS Client Events/Operational |
windows | product: windows service: dns-server |
Channel: DNS Server |
windows | product: windows service: dns-server-analytic |
Channel: Microsoft-Windows-DNS-Server/Analytical |
windows | product: windows service: dns-server-audit |
Channel: Microsoft-Windows-DNS-Server/Audit |
windows | product: windows service: driver-framework |
Channel: Microsoft-Windows-DriverFrameworks-UserMode/Operational |
windows | product: windows service: firewall-as |
Channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall |
windows | product: windows service: hyper-v-worker |
Channel: Microsoft-Windows-Hyper-V-Worker |
windows | product: windows service: iis-configuration |
Channel: Microsoft-IIS-Configuration/Operational |
windows | product: windows service: kernel-event-tracing |
Channel: Microsoft-Windows-Kernel-EventTracing |
windows | product: windows service: kernel-shimengine |
Channel: - Microsoft-Windows-Kernel-ShimEngine/Operational - WinEventLog:Microsoft-Windows-Kernel-ShimEngine/Diagnostic |
windows | product: windows service: ldap |
Channel: Microsoft-Windows-LDAP-Client/Debug |
windows | product: windows service: lsa-server |
Channel: Microsoft-Windows-LSA/Operational |
windows | product: windows service: msexchange-management |
Channel: MSExchange Management |
windows | product: windows service: ntfs |
Channel: Microsoft-Windows-Ntfs/Operational |
windows | product: windows service: ntlm |
Channel: Microsoft-Windows-NTLM/Operational |
windows | product: windows service: openssh |
Channel: OpenSSH/Operational |
windows | product: windows service: powershell |
Channel: Microsoft-Windows-PowerShell/Operational |
windows | product: windows service: powershell-classic |
Channel: Windows PowerShell |
windows | product: windows service: printservice-admin |
Channel: Microsoft-Windows-PrintService/Admin |
windows | product: windows service: printservice-operational |
Channel: Microsoft-Windows-PrintService/Operational |
windows | product: windows service: security |
Channel: Security |
windows | product: windows service: security-mitigations |
Channel: - Microsoft-Windows-Security-Mitigations/Kernel Mode - Microsoft-Windows-Security-Mitigations/User Mode |
windows | product: windows service: sense |
Channel: Microsoft-Windows-SENSE/Operational |
windows | product: windows service: servicebus-client |
Channel: - Microsoft-ServiceBus-Client/Operational - Microsoft-ServiceBus-Client/Admin |
windows | product: windows service: shell-core |
Channel: Microsoft-Windows-Shell-Core/Operational |
windows | product: windows service: smbclient-security |
Channel: Microsoft-Windows-SmbClient/Security |
windows | product: windows service: sysmon |
Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows service: system |
Channel: System |
windows | product: windows service: taskscheduler |
Channel: Microsoft-Windows-TaskScheduler/Operational |
windows | product: windows service: terminalservices-localsessionmanager |
Channel: Microsoft-Windows-TerminalServices-LocalSessionManager/Operational |
windows | product: windows service: vhdmp |
Channel: Microsoft-Windows-VHDMP/Operational |
windows | product: windows service: windefend |
Channel: Microsoft-Windows-Windows Defender/Operational |
windows | product: windows service: wmi |
Channel: Microsoft-Windows-WMI-Activity/Operational |
Process creation events can be defined with the generic log source category process_creation. The event scope can be further restricted with product. Example for a process creation event log source restricted to Windows:
category: process_creation
product: windows
The field names follow the field names used in Sysmon events:
Field Name | Example Value | Comment |
---|---|---|
UtcTime | 2019-03-02 08:51:00.008 | |
ProcessGuid | {c1b49677-43f4-5c7a-0000-0010d3dd8044} | |
ProcessId | 1028 | |
Image | C:\Program Files (x86)\Google\Update\GoogleUpdate.exe | |
FileVersion | 1.3.28.13 | |
Description | Google Installer | |
Product | Google Update | |
Company | Google Inc. | |
CommandLine | “C:\Program Files (x86)\Google\Update\GoogleUpdate.exe” /ua /installsource scheduler | |
CurrentDirectory | C:\Windows\system32| | |
User | NT AUTHORITY\SYSTEM | |
LogonGuid | {c1b49677-3fb9-5c09-0000-0020e7030000} | |
LogonId | 0x3e7 | |
TerminalSessionId | 0 | |
IntegrityLevel | System | |
imphash | E96A73C7BF33A464C510EDE582318BF2 | |
md5 | CCF1D1573F175299ADE01C07791A6541 | |
sha1 | 0AE1F9071C5E8FE4A69D3F671937935D242D8A6C | |
sha256 | 68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2 | |
ParentProcessGuid | {c1b49677-6b43-5c78-0000-00107fb77544} | |
ParentProcessId | 1724 | |
ParentImage | C:\Windows\System32\taskeng.exe | |
ParentCommandLine | taskeng.exe {88F94E5C-5DC3-4606-AEFA-BDCA976D6113} S-1-5-18:NT AUTHORITY\System:Service: |
We align our field names to the field names that Sysmon uses. You can find all possible field values in the Sysmon Community Guide and on UltimateWindowsSecurity.com.
product: windows
: Windows Operating System logs. The naming of Windows Eventlog attributes is used in Sigma rules.
service: security
: Windows Security Event Log. Some may be covered by generic log sources.service: system
: Windows System Event Logservice: sysmon
: Event Logs created by Sysmon. Some may be covered by generic log sources.service: taskscheduler
service: wmi
service: application
service: dns-server
service: driver-framework
service: powershell
service: powershell-classic
product: linux
: Linux log files
service: auth
: Linux authentication logs. Usually /var/log/auth.log.service: auditd
: Linux audit logsservice: clamav
: ClamAV logsproduct: apache
: Apache httpd logs
service: access
: Access logsservice: error
: Error logscategory: proxy
c-uri
: URL requested by clientc-uri-extension
: Extension of the URL. Commonly is the requested extension of a file namec-uri-query
: Path component of requested URLc-uri-stem
: Stem of the requested URLc-useragent
: the clients user agent.cs-bytes
: Number of bytes sent from the servercs-cookie
: Cookie headers sent from client to server.cs-host
: Host header send from client to servercs-method
: HTTP request methodr-dns
: The Domain requested. Additionally is referred to as the Host header or URL Domain. Recommend to use cs-host
instead of this fieldcs-referrer
: The referring link or sitecs-version
: The HTTP protocol version that the client usedsc-bytes
: Number of bytes sent from the clientsc-status
: The HTTP status codesrc_ip
: The IP address of the client that made the requestdst_ip
: The IP address of the servercategory: firewall
src_ip
, src_port
, dst_ip
, dst_port
, username
category: dns
category: webserver
date
: The date that the activity occurred.time
: The time that the activity occurred.c-ip
:The IP address of the client that accessed your server.cs-username
: The name of the authenticated user who accessed your server. This does not include anonymous users, who are represented by a hyphen (-).s-sitename
: The Internet service and instance number that was accessed by a client.s-computername
: The name of the server on which the log entry was generated.s-ip
: The IP address of the server on which the log entry was generated.s-port
: The port number the client is connected to.cs-method
: The action the client was trying to perform (for example, a GET method).cs-uri-stem
: The resource accessed; for example, Default.htm.cs-uri-query
: The query, if any, the client was trying to perform.sc-status
: The status of the action, in HTTP or FTP terms.c-win32-status
: The status of the action, in terms used by Microsoft Windows®.sc-bytes
: The number of bytes sent by the server.cs-bytes
: The number of bytes received by the server.time-taken
: The duration of time, in milliseconds, that the action consumed.cs-version
: The protocol (HTTP, FTP) version used by the client. For HTTP this will be either HTTP 1.0 or HTTP 1.1.cs-host
: Displays the content of the host header.cs-user-agent
: The browser used on the client.cs-cookie
: The content of the cookie sent or received, if any.cs-referer
: The previous site visited by the user. This site provided a link to the current site.product: antivirus
Filename
: the name and path of the source threat fileSignature
: name of the threat like “EICAR-Test-File”Action
: action take by the antivirus like “delete”service: iis-configuration
ldap_debug
to ldap
service: application-experience
service: capi2
service: certificateservicesclient-lifecycle-system
service: hyper-v-worker
service: kernel-event-tracing
service: kernel-shimengine
service: ntfs
service: sense
service: servicebus-client
product: github
service: audit
service: appxdeployment-server
service: lsa-server
service: appxpackaging-om
service: dns-client
service: appmodel-runtime
service: vhdmp
service: bgp
service: ldp
service: bgp
service: bgp
product
logsourcewebserver
file_create
category to file_event