The following document defines the field names and log sources that are allowed to be used in SIGMA rules that are shared on the official SigmaHQ repository.
- Version 2.0.2
- Release date 2024-11-01
For a better comprehension, the log sources are organized by directory name similar to the rules structure in the SIGMA project.
The application folder contains rules that are intended for application security monitoring. The rules are organized into folders per application technology. All rules define log sources as follows:
-
The category log source attribute is set to
application
. This can be used by processing pipelines to create a technology-agnostic conversion configuration in cases where the application technology stack is unknown. -
The product log source attribute is set to the name of the technology and should be equal to the folder name.
Because application logs are often ingested as raw text events with poor decomposition into fields by many target systems, these rules are keyword rules that don't match on specific fields.
Product | Logsource | Event |
---|---|---|
django | category: application product: django |
Product | Logsource | Event |
---|---|---|
python | category: application product: python |
Product | Logsource | Event |
---|---|---|
rpc_firewall | category: application product: rpc_firewall |
Product | Logsource | Event |
---|---|---|
ruby_on_rails | category: application product: ruby_on_rails |
Product | Logsource | Event |
---|---|---|
spring | category: application product: spring |
Product | Logsource | Event |
---|---|---|
sql | category: application product: sql |
Product | Logsource | Event |
---|---|---|
category: antivirus | antivirus detection message (format depends on the editor) | |
category: database | sql queries log (drop, select,...) |
Product | Logsource | Event |
---|---|---|
Aws | product: aws service: cloudtrail |
Product | Logsource | Event |
---|---|---|
Azure | product: azure service: activitylogs |
|
Azure | product: azure service: auditlogs |
|
Azure | product: azure service: riskdetection |
|
Azure | product: azure service: pim |
|
Azure | product: azure service: signinlogs |
Product | Logsource | Event |
---|---|---|
Bitbucket | product: bitbucket service: audit |
Product | Logsource | Event |
---|---|---|
Cisco | product: cisco service: duo |
Product | Logsource | Event |
---|---|---|
GCP | product: gcp service: gcp.audit |
|
GCP | product: gcp service: google_workspace.admin |
Product | Logsource | Event |
---|---|---|
Github | product: github service: audit |
organization Audit log |
Product | Logsource | Event |
---|---|---|
M365 | product: m365 service: audit |
|
M365 | product: m365 service: exchange |
|
M365 | product: m365 service: threat_detection |
|
M365 | product: m365 service: threat_management |
Product | Logsource | Event |
---|---|---|
Okta | product: okta service: okta |
Product | Logsource | Event |
---|---|---|
Onelogin | product: onelogin service: onelogin.events |
Product | Logsource | Event |
---|---|---|
Linux | product: linux category: file_event |
EventID: 11 service: sysmon |
Linux | product: linux category: network_connection |
EventID: 3 service: sysmon |
Linux | product: linux category: process_creation |
EventID: 1 service: sysmon |
Product | Logsource | Event |
---|---|---|
Linux | product: linux service: auditd |
auditd.log |
Linux | product: linux service: auth |
auth.log |
Linux | product: linux service: clamav |
|
Linux | product: linux service: cron |
|
Linux | product: linux service: guacamole |
|
Linux | product: linux service: sudo |
|
Linux | product: linux service: sshd |
|
Linux | product: linux service: syslog |
|
Linux | product: linux service: vsftpd |
Product | Logsource | Event |
---|---|---|
Macos | product: macos category: file_event |
|
Macos | product: macos category: process_creation |
Product | Logsource | Description |
---|---|---|
Cisco | product: cisco service: aaa |
|
Cisco | product: cisco service: bgp |
|
Cisco | product: cisco service: ldp |
Product | Logsource | Description |
---|---|---|
Huawei | product: huawei service: ldp |
Product | Logsource | Description |
---|---|---|
Juniper | product: juniper service: ldp |
Product | Logsource | Description |
---|---|---|
Zeek | product: zeek service: dce_rpc |
|
Zeek | product: zeek service: dns |
|
Zeek | product: zeek service: http |
|
Zeek | product: zeek service: kerberos |
|
Zeek | product: zeek service: rdp |
|
Zeek | product: zeek service: smb_files |
|
Zeek | product: zeek service: x509 |
Product | Logsource | Description |
---|---|---|
N/A | category: dns | |
N/A | category: firewall | |
N/A | category: proxy | |
N/A | category: webserver |
Product | Logsource | Event |
---|---|---|
Apache | service: apache | Application error.log |
Modsecurity | product: modsecurity |
Product | Logsource | Description |
---|---|---|
windows | product: windows category: process_creation |
EventID: 1 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_change |
EventID: 2 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: network_connection |
EventID: 3 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: sysmon_status |
EventIDs: - 4 - 16 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: process_termination |
EventID: 5 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: driver_load |
EventID: 6 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: image_load |
EventID: 7 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: create_remote_thread |
EventID: 8 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: raw_access_thread |
EventID: 9 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: process_access |
EventID: 10 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_event |
EventID: 11 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_event |
EventID: - 12 - 13 - 14 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_add |
EventID: 12 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_delete |
EventID: 12 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_set |
EventID: 13 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: registry_rename |
EventID: 14 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: create_stream_hash |
EventID: 15 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: pipe_created |
EventIDs: - 17 - 18 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: wmi_event |
EventIDs: - 19 - 20 - 21 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: dns_query |
EventID: 22 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_delete |
EventID: 23 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: clipboard_capture |
EventID: 24 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: process_tampering |
EventID: 25 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_delete_detected |
EventID: 26 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_block_executable |
EventID: 27 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_block_shredding |
EventID: 28 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_executable_detected |
EventID: 29 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: sysmon_error |
EventID: 255 Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows category: file_access |
ETW Provider: Microsoft-Windows-Kernel-File |
windows | product: windows category: ps_classic_start |
EventID: 400 Channel: Windows PowerShell |
windows | product: windows category: ps_classic_provider_start |
EventID: 600 Channel: Windows PowerShell |
windows | product: windows category: ps_classic_script |
EventID: 800 Channel: Windows PowerShell |
windows | product: windows category: ps_module |
EventID: 4103 Channel: - Microsoft-Windows-PowerShell/Operational - PowerShellCore/Operational |
windows | product: windows category: ps_script |
EventID: 4104 Channel: - Microsoft-Windows-PowerShell/Operational - PowerShellCore/Operational |
windows | product: windows category: file_rename |
ETW Provider: Microsoft-Windows-Kernel-File |
Product | Logsource | Description |
---|---|---|
windows | product: windows service: application |
Channel: Application |
windows | product: windows service: application-experience |
Channel: - Microsoft-Windows-Application-Experience/Program-Telemetry - Microsoft-Windows-Application-Experience/Program-Compatibility-Assistant |
windows | product: windows service: applocker |
Channel: - Microsoft-Windows-AppLocker/MSI and Script - Microsoft-Windows-AppLocker/EXE and DLL - Microsoft-Windows-AppLocker/Packaged app-Deployment - Microsoft-Windows-AppLocker/Packaged app-Execution |
windows | product: windows service: appmodel-runtime |
Channel: Microsoft-Windows-AppModel-Runtime/Admin |
windows | product: windows service: appxdeployment-server |
Channel: Microsoft-Windows-AppXDeploymentServer/Operational |
windows | product: windows service: appxpackaging-om |
Channel: Microsoft-Windows-AppxPackaging/Operational |
windows | product: windows service: bitlocker |
Channel: Microsoft-Windows-BitLocker/BitLocker Management |
windows | product: windows service: bits-client |
Channel: Microsoft-Windows-Bits-Client/Operational |
windows | product: windows service: capi2 |
Channel: Microsoft-Windows-CAPI2/Operational |
windows | product: windows service: certificateservicesclient-lifecycle-system |
Channel: Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational |
windows | product: windows service: codeintegrity-operational |
Channel: Microsoft-Windows-CodeIntegrity/Operational |
windows | product: windows service: dhcp |
Channel: Microsoft-Windows-DHCP-Server/Operational |
windows | product: windows service: diagnosis-scripted |
Channel: Microsoft-Windows-Diagnosis-Scripted/Operational |
windows | product: windows service: dns-client |
Channel: Microsoft-Windows-DNS Client Events/Operational |
windows | product: windows service: dns-server |
Channel: DNS Server |
windows | product: windows service: dns-server-analytic |
Channel: Microsoft-Windows-DNS-Server/Analytical |
windows | product: windows service: dns-server-audit |
Channel: Microsoft-Windows-DNS-Server/Audit |
windows | product: windows service: driver-framework |
Channel: Microsoft-Windows-DriverFrameworks-UserMode/Operational |
windows | product: windows service: firewall-as |
Channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall |
windows | product: windows service: hyper-v-worker |
Channel: Microsoft-Windows-Hyper-V-Worker |
windows | product: windows service: iis-configuration |
Channel: Microsoft-IIS-Configuration/Operational |
windows | product: windows service: kernel-event-tracing |
Channel: Microsoft-Windows-Kernel-EventTracing |
windows | product: windows service: kernel-shimengine |
Channel: - Microsoft-Windows-Kernel-ShimEngine/Operational - WinEventLog:Microsoft-Windows-Kernel-ShimEngine/Diagnostic |
windows | product: windows service: ldap |
Channel: Microsoft-Windows-LDAP-Client/Debug |
windows | product: windows service: lsa-server |
Channel: Microsoft-Windows-LSA/Operational |
windows | product: windows service: msexchange-management |
Channel: MSExchange Management |
windows | product: windows service: ntfs |
Channel: Microsoft-Windows-Ntfs/Operational |
windows | product: windows service: ntlm |
Channel: Microsoft-Windows-NTLM/Operational |
windows | product: windows service: openssh |
Channel: OpenSSH/Operational |
windows | product: windows service: powershell |
Channel: Microsoft-Windows-PowerShell/Operational |
windows | product: windows service: powershell-classic |
Channel: Windows PowerShell |
windows | product: windows service: printservice-admin |
Channel: Microsoft-Windows-PrintService/Admin |
windows | product: windows service: printservice-operational |
Channel: Microsoft-Windows-PrintService/Operational |
windows | product: windows service: security |
Channel: Security |
windows | product: windows service: security-mitigations |
Channel: - Microsoft-Windows-Security-Mitigations/Kernel Mode - Microsoft-Windows-Security-Mitigations/User Mode |
windows | product: windows service: sense |
Channel: Microsoft-Windows-SENSE/Operational |
windows | product: windows service: servicebus-client |
Channel: - Microsoft-ServiceBus-Client/Operational - Microsoft-ServiceBus-Client/Admin |
windows | product: windows service: shell-core |
Channel: Microsoft-Windows-Shell-Core/Operational |
windows | product: windows service: smbclient-security |
Channel: Microsoft-Windows-SmbClient/Security |
windows | product: windows service: sysmon |
Channel: Microsoft-Windows-Sysmon/Operational |
windows | product: windows service: system |
Channel: System |
windows | product: windows service: taskscheduler |
Channel: Microsoft-Windows-TaskScheduler/Operational |
windows | product: windows service: terminalservices-localsessionmanager |
Channel: Microsoft-Windows-TerminalServices-LocalSessionManager/Operational |
windows | product: windows service: vhdmp |
Channel: Microsoft-Windows-VHDMP/Operational |
windows | product: windows service: windefend |
Channel: Microsoft-Windows-Windows Defender/Operational |
windows | product: windows service: wmi |
Channel: Microsoft-Windows-WMI-Activity/Operational |
Process creation events can be defined with the generic log source category process_creation. The event scope can be further restricted with product. Example for a process creation event log source restricted to Windows:
category: process_creation
product: windows
The field names follow the field names used in Sysmon events:
Field Name | Example Value | Comment |
---|---|---|
UtcTime | 2019-03-02 08:51:00.008 | |
ProcessGuid | {c1b49677-43f4-5c7a-0000-0010d3dd8044} | |
ProcessId | 1028 | |
Image | C:\Program Files (x86)\Google\Update\GoogleUpdate.exe | |
FileVersion | 1.3.28.13 | |
Description | Google Installer | |
Product | Google Update | |
Company | Google Inc. | |
CommandLine | "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource scheduler | |
CurrentDirectory | C:\Windows\system32| | |
User | NT AUTHORITY\SYSTEM | |
LogonGuid | {c1b49677-3fb9-5c09-0000-0020e7030000} | |
LogonId | 0x3e7 | |
TerminalSessionId | 0 | |
IntegrityLevel | System | |
imphash | E96A73C7BF33A464C510EDE582318BF2 | |
md5 | CCF1D1573F175299ADE01C07791A6541 | |
sha1 | 0AE1F9071C5E8FE4A69D3F671937935D242D8A6C | |
sha256 | 68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2 | |
ParentProcessGuid | {c1b49677-6b43-5c78-0000-00107fb77544} | |
ParentProcessId | 1724 | |
ParentImage | C:\Windows\System32\taskeng.exe | |
ParentCommandLine | taskeng.exe {88F94E5C-5DC3-4606-AEFA-BDCA976D6113} S-1-5-18:NT AUTHORITY\System:Service: |
We align our field names to the field names that Sysmon uses. You can find all possible field values in the Sysmon Community Guide and on UltimateWindowsSecurity.com.
product: windows
: Windows Operating System logs. The naming of Windows Eventlog attributes is used in Sigma rules.service: security
: Windows Security Event Log. Some may be covered by generic log sources.service: system
: Windows System Event Logservice: sysmon
: Event Logs created by Sysmon. Some may be covered by generic log sources.service: taskscheduler
service: wmi
service: application
service: dns-server
service: driver-framework
service: powershell
service: powershell-classic
product: linux
: Linux log filesservice: auth
: Linux authentication logs. Usually /var/log/auth.log.service: auditd
: Linux audit logsservice: clamav
: ClamAV logs
product: apache
: Apache httpd logsservice: access
: Access logsservice: error
: Error logs
category: proxy
- Field Name according to W3C Extended Log File Format. Additional W3 examples can be found from Microsoft.
- Field names:
c-uri
: URL requested by clientc-uri-extension
: Extension of the URL. Commonly is the requested extension of a file namec-uri-query
: Path component of requested URLc-uri-stem
: Stem of the requested URLc-useragent
: the clients user agent.cs-bytes
: Number of bytes sent from the servercs-cookie
: Cookie headers sent from client to server.cs-host
: Host header send from client to servercs-method
: HTTP request methodr-dns
: The Domain requested. Additionally is referred to as the Host header or URL Domain. Recommend to usecs-host
instead of this fieldcs-referrer
: The referring link or sitecs-version
: The HTTP protocol version that the client usedsc-bytes
: Number of bytes sent from the clientsc-status
: The HTTP status codesrc_ip
: The IP address of the client that made the requestdst_ip
: The IP address of the server
category: firewall
- Field Names:
src_ip
,src_port
,dst_ip
,dst_port
,username
- Field Names:
category: dns
category: webserver
date
: The date that the activity occurred.time
: The time that the activity occurred.c-ip
:The IP address of the client that accessed your server.cs-username
: The name of the authenticated user who accessed your server. This does not include anonymous users, who are represented by a hyphen (-).s-sitename
: The Internet service and instance number that was accessed by a client.s-computername
: The name of the server on which the log entry was generated.s-ip
: The IP address of the server on which the log entry was generated.s-port
: The port number the client is connected to.cs-method
: The action the client was trying to perform (for example, a GET method).cs-uri-stem
: The resource accessed; for example, Default.htm.cs-uri-query
: The query, if any, the client was trying to perform.sc-status
: The status of the action, in HTTP or FTP terms.c-win32-status
: The status of the action, in terms used by Microsoft Windows®.sc-bytes
: The number of bytes sent by the server.cs-bytes
: The number of bytes received by the server.time-taken
: The duration of time, in milliseconds, that the action consumed.cs-version
: The protocol (HTTP, FTP) version used by the client. For HTTP this will be either HTTP 1.0 or HTTP 1.1.cs-host
: Displays the content of the host header.cs-user-agent
: The browser used on the client.cs-cookie
: The content of the cookie sent or received, if any.cs-referer
: The previous site visited by the user. This site provided a link to the current site.
product: antivirus
- Field Names:
Filename
: the name and path of the source threat fileSignature
: name of the threat like "EICAR-Test-File"Action
: action take by the antivirus like "delete"
- Field Names:
- 2024-11-01 Taxonomy Appendix v v2.0.2
- Add new windows services:
service: iis-configuration
- Add new windows services:
- 2024-08-11 Taxonomy Appendix v v2.0.1
- Restructure the document for a better reading experience
- 2024-08-08 Taxonomy Appendix v v2.0.0
- Fix the following windows services:
- Change
ldap_debug
toldap
- Change
- Add new windows services:
service: application-experience
service: capi2
service: certificateservicesclient-lifecycle-system
service: hyper-v-worker
service: kernel-event-tracing
service: kernel-shimengine
service: ntfs
service: sense
service: servicebus-client
- Fix the following windows services:
- 2023-01-21 Taxonomy Appendix v1.3.5
- Add new product and its related service:
product: github
service: audit
- Add new product and its related service:
- 2023-01-18 Taxonomy Appendix v1.3.4
- Add the following new windows services:
service: appxdeployment-server
service: lsa-server
service: appxpackaging-om
service: dns-client
service: appmodel-runtime
service: vhdmp
- Add new cisco services:
service: bgp
service: ldp
- Add new huawei
service: bgp
- Add new juniper
service: bgp
- Add missing category folder
- Add missing product folder
- Add description for a special case when using only the
product
logsource
- Add the following new windows services:
- 2023-01-03 Taxonomy Appendix v1.3.3
- Add windows service dns-server-analytic and bitlocker
- Add all the W3C fields names to the category
webserver
- Update linux
file_create
category tofile_event
- 2022-12-19 Taxonomy Appendix v1.3.2
- Minor tweak and updates to the syntax and text
- 2022-11-13 Taxonomy Appendix v1.3.1
- Add missing service shell-core
- 2022-11-01 Taxonomy Appendix v1.3.0
- Add missing windows services
- 2022-10-25 Taxonomy Appendix v1.2.0
- Order the windows logs
- 2022-10-19 Taxonomy Appendix v1.1.0
- Fix links and spelling
- 2022-09-18 Taxonomy v1.0.0
- Initial release