5.9 KiB
Sigma Log Source Reference
Log Source Categories
process_creation
Description: Process creation/execution events
Common Products: Windows (Sysmon Event ID 1), Linux (auditd), EDR platforms
Key Fields:
Image- Full path to executableCommandLine- Full command line with argumentsParentImage- Parent process executable pathParentCommandLine- Parent process command lineUser- User account that created processIntegrityLevel- Process integrity level (Windows)Hashes- File hashes (MD5, SHA256)
Example:
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\powershell.exe'
CommandLine|contains: '-enc'
network_connection
Description: Network connection events
Common Products: Sysmon Event ID 3, Firewall logs, EDR
Key Fields:
Image- Process making connectionDestinationIp- Remote IP addressDestinationPort- Remote portDestinationHostname- Remote hostnameSourceIp- Local IP addressSourcePort- Local portInitiated- Connection initiated (true/false)
Example:
logsource:
category: network_connection
product: windows
detection:
selection:
Initiated: 'true'
DestinationPort: 4444
file_event
Description: File creation, modification, deletion
Common Products: Sysmon Events 11/23, File integrity monitoring
Key Fields:
Image- Process creating/modifying fileTargetFilename- File pathCreationUtcTime- File creation time
Example:
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|contains: '\Windows\Temp\'
TargetFilename|endswith: '.exe'
registry_event
Description: Registry key/value modifications
Common Products: Sysmon Events 12/13/14, Windows Event Logs
Key Fields:
TargetObject- Registry key pathDetails- Registry value dataEventType- SetValue, CreateKey, DeleteKey
Example:
logsource:
category: registry_event
product: windows
detection:
selection:
TargetObject|contains: '\CurrentVersion\Run'
image_load
Description: DLL/image load events
Common Products: Sysmon Event ID 7
Key Fields:
Image- Process loading the imageImageLoaded- Path to loaded DLL/imageSigned- Digital signature status
Example:
logsource:
category: image_load
product: windows
detection:
selection:
ImageLoaded|endswith: '\evil.dll'
Signed: 'false'
dns_query
Description: DNS query events
Common Products: Sysmon Event ID 22, DNS server logs, proxy logs
Key Fields:
QueryName- DNS name queriedQueryResults- DNS response IPsImage- Process making query
Example:
logsource:
category: dns_query
product: windows
detection:
selection:
QueryName|endswith: '.onion'
web_request
Description: HTTP/HTTPS requests
Common Products: Proxy logs, web server logs, WAF
Key Fields:
c-uri- Requested URIc-useragent- User agent stringcs-method- HTTP methodsc-status- HTTP status code
authentication
Description: Authentication events (success/failure)
Common Products: Windows Security Events 4624/4625, Linux auth.log
Key Fields:
EventID- 4624 (success), 4625 (failure), 4768 (Kerberos)LogonType- Type of logon (2=Interactive, 3=Network, 10=RemoteInteractive)TargetUserName- Account being authenticatedWorkstationName- Source workstationIpAddress- Source IP
Example:
logsource:
category: authentication
product: windows
detection:
selection:
EventID: 4625 # Failed logon
Products
Common product values:
windows- Windows OSlinux- Linux OSmacos- macOSazure- Microsoft Azureaws- Amazon Web Servicesgcp- Google Cloud Platformm365- Microsoft 365okta- Okta identity platformfirewall- Generic firewallproxy- Web proxy
Service Definitions
For cloud services, use service field:
logsource:
product: azure
service: azuread
Common services:
azuread- Azure Active Directoryazureactivity- Azure Activity Logscloudtrail- AWS CloudTrailcloudwatch- AWS CloudWatchgcp.audit- GCP Audit Logs
Field Naming Conventions
Sigma uses normalized field names:
Process Fields
Image- Full executable pathCommandLine- Command line argumentsParentImage- Parent process pathUser- UsernameProcessId- Process ID
Network Fields
SourceIp/DestinationIpSourcePort/DestinationPortProtocol- Network protocol
File Fields
TargetFilename- File pathSourceFilename- Original file location (for copies/moves)
Registry Fields
TargetObject- Registry key pathDetails- Registry value data
Backend-Specific Mappings
Each backend maps these generic fields to product-specific field names:
Sigma Generic → Splunk Sysmon:
Image→ImageCommandLine→CommandLineParentImage→ParentImage
Sigma Generic → Elasticsearch ECS:
Image→process.executableCommandLine→process.command_lineParentImage→process.parent.executable
Log Source Discovery
To identify available log sources:
- Review SIEM data sources: Check what logs are ingested
- Verify field mappings: Ensure Sigma fields map correctly
- Test conversions: Convert sample rules and validate output
- Check coverage: Ensure critical log sources are available