Skip to content

Latest commit

 

History

History
495 lines (412 loc) · 45.6 KB

sigma-taxonomy-appendix.md

File metadata and controls

495 lines (412 loc) · 45.6 KB

Sigma Taxonomy

The following document defines the field names and log sources that are allowed to be used in SIGMA rules that are shared on the official SigmaHQ repository.

  • Version 2.0.2
  • Release date 2024-11-01

Summary

Log Sources

For a better comprehension, the log sources are organized by directory name similar to the rules structure in the SIGMA project.

Application Folder

The application folder contains rules that are intended for application security monitoring. The rules are organized into folders per application technology. All rules define log sources as follows:

  • The category log source attribute is set to application. This can be used by processing pipelines to create a technology-agnostic conversion configuration in cases where the application technology stack is unknown.

  • The product log source attribute is set to the name of the technology and should be equal to the folder name.

Because application logs are often ingested as raw text events with poor decomposition into fields by many target systems, these rules are keyword rules that don't match on specific fields.

Django

Product Logsource Event
django category: application
product: django

Python

Product Logsource Event
python category: application
product: python

RPC Firewall

Product Logsource Event
rpc_firewall category: application
product: rpc_firewall

Ruby on Rails

Product Logsource Event
ruby_on_rails category: application
product: ruby_on_rails

Spring Framework

Product Logsource Event
spring category: application
product: spring

SQL

Product Logsource Event
sql category: application
product: sql

Category Folder

Product Logsource Event
category: antivirus antivirus detection message (format depends on the editor)
category: database sql queries log (drop, select,...)

Cloud Folder

AWS

Product Logsource Event
Aws product: aws
service: cloudtrail

Azure

Product Logsource Event
Azure product: azure
service: activitylogs
Azure product: azure
service: auditlogs
Azure product: azure
service: riskdetection
Azure product: azure
service: pim
Azure product: azure
service: signinlogs

Bitbucket

Product Logsource Event
Bitbucket product: bitbucket
service: audit

Cisco

Product Logsource Event
Cisco product: cisco
service: duo

GCP

Product Logsource Event
GCP product: gcp
service: gcp.audit
GCP product: gcp
service: google_workspace.admin

Github

Product Logsource Event
Github product: github
service: audit
organization Audit log

M365

Product Logsource Event
M365 product: m365
service: audit
M365 product: m365
service: exchange
M365 product: m365
service: threat_detection
M365 product: m365
service: threat_management

Okta

Product Logsource Event
Okta product: okta
service: okta

OneLogin

Product Logsource Event
Onelogin product: onelogin
service: onelogin.events

Linux Folder

Category

Product Logsource Event
Linux product: linux
category: file_event
EventID: 11
service: sysmon
Linux product: linux
category: network_connection
EventID: 3
service: sysmon
Linux product: linux
category: process_creation
EventID: 1
service: sysmon

Service

Product Logsource Event
Linux product: linux
service: auditd
auditd.log
Linux product: linux
service: auth
auth.log
Linux product: linux
service: clamav
Linux product: linux
service: cron
Linux product: linux
service: guacamole
Linux product: linux
service: sudo
Linux product: linux
service: sshd
Linux product: linux
service: syslog
Linux product: linux
service: vsftpd

Macos Folder

Category

Product Logsource Event
Macos product: macos
category: file_event
Macos product: macos
category: process_creation

Network Folder

Cisco

Product Logsource Description
Cisco product: cisco
service: aaa
Cisco product: cisco
service: bgp
Cisco product: cisco
service: ldp

Huawei

Product Logsource Description
Huawei product: huawei
service: ldp

Juniper

Product Logsource Description
Juniper product: juniper
service: ldp

Zeek

Product Logsource Description
Zeek product: zeek
service: dce_rpc
Zeek product: zeek
service: dns
Zeek product: zeek
service: http
Zeek product: zeek
service: kerberos
Zeek product: zeek
service: rdp
Zeek product: zeek
service: smb_files
Zeek product: zeek
service: x509

Other

Product Logsource Description
N/A category: dns
N/A category: firewall
N/A category: proxy
N/A category: webserver

Product Folder

Product Logsource Event
Apache service: apache Application error.log
Modsecurity product: modsecurity

Windows Folder

Category

Product Logsource Description
windows product: windows
category: process_creation
EventID: 1
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_change
EventID: 2
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: network_connection
EventID: 3
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: sysmon_status
EventIDs:
- 4
- 16
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: process_termination
EventID: 5
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: driver_load
EventID: 6
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: image_load
EventID: 7
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: create_remote_thread
EventID: 8
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: raw_access_thread
EventID: 9
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: process_access
EventID: 10
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_event
EventID: 11
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_event
EventID:
- 12
- 13
- 14
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_add
EventID: 12
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_delete
EventID: 12
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_set
EventID: 13
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: registry_rename
EventID: 14
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: create_stream_hash
EventID: 15
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: pipe_created
EventIDs:
- 17
- 18
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: wmi_event
EventIDs:
- 19
- 20
- 21
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: dns_query
EventID: 22
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_delete
EventID: 23
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: clipboard_capture
EventID: 24
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: process_tampering
EventID: 25
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_delete_detected
EventID: 26
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_block_executable
EventID: 27
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_block_shredding
EventID: 28
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_executable_detected
EventID: 29
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: sysmon_error
EventID: 255
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
category: file_access
ETW Provider: Microsoft-Windows-Kernel-File
windows product: windows
category: ps_classic_start
EventID: 400
Channel: Windows PowerShell
windows product: windows
category: ps_classic_provider_start
EventID: 600
Channel: Windows PowerShell
windows product: windows
category: ps_classic_script
EventID: 800
Channel: Windows PowerShell
windows product: windows
category: ps_module
EventID: 4103
Channel:
- Microsoft-Windows-PowerShell/Operational
- PowerShellCore/Operational
windows product: windows
category: ps_script
EventID: 4104
Channel:
- Microsoft-Windows-PowerShell/Operational
- PowerShellCore/Operational
windows product: windows
category: file_rename
ETW Provider: Microsoft-Windows-Kernel-File

Service

Product Logsource Description
windows product: windows
service: application
Channel: Application
windows product: windows
service: application-experience
Channel:
- Microsoft-Windows-Application-Experience/Program-Telemetry
- Microsoft-Windows-Application-Experience/Program-Compatibility-Assistant
windows product: windows
service: applocker
Channel:
- Microsoft-Windows-AppLocker/MSI and Script
- Microsoft-Windows-AppLocker/EXE and DLL
- Microsoft-Windows-AppLocker/Packaged app-Deployment
- Microsoft-Windows-AppLocker/Packaged app-Execution
windows product: windows
service: appmodel-runtime
Channel: Microsoft-Windows-AppModel-Runtime/Admin
windows product: windows
service: appxdeployment-server
Channel: Microsoft-Windows-AppXDeploymentServer/Operational
windows product: windows
service: appxpackaging-om
Channel: Microsoft-Windows-AppxPackaging/Operational
windows product: windows
service: bitlocker
Channel: Microsoft-Windows-BitLocker/BitLocker Management
windows product: windows
service: bits-client
Channel: Microsoft-Windows-Bits-Client/Operational
windows product: windows
service: capi2
Channel: Microsoft-Windows-CAPI2/Operational
windows product: windows
service: certificateservicesclient-lifecycle-system
Channel: Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational
windows product: windows
service: codeintegrity-operational
Channel: Microsoft-Windows-CodeIntegrity/Operational
windows product: windows
service: dhcp
Channel: Microsoft-Windows-DHCP-Server/Operational
windows product: windows
service: diagnosis-scripted
Channel: Microsoft-Windows-Diagnosis-Scripted/Operational
windows product: windows
service: dns-client
Channel: Microsoft-Windows-DNS Client Events/Operational
windows product: windows
service: dns-server
Channel: DNS Server
windows product: windows
service: dns-server-analytic
Channel: Microsoft-Windows-DNS-Server/Analytical
windows product: windows
service: dns-server-audit
Channel: Microsoft-Windows-DNS-Server/Audit
windows product: windows
service: driver-framework
Channel: Microsoft-Windows-DriverFrameworks-UserMode/Operational
windows product: windows
service: firewall-as
Channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
windows product: windows
service: hyper-v-worker
Channel: Microsoft-Windows-Hyper-V-Worker
windows product: windows
service: iis-configuration
Channel: Microsoft-IIS-Configuration/Operational
windows product: windows
service: kernel-event-tracing
Channel: Microsoft-Windows-Kernel-EventTracing
windows product: windows
service: kernel-shimengine
Channel:
- Microsoft-Windows-Kernel-ShimEngine/Operational
- WinEventLog:Microsoft-Windows-Kernel-ShimEngine/Diagnostic
windows product: windows
service: ldap
Channel: Microsoft-Windows-LDAP-Client/Debug
windows product: windows
service: lsa-server
Channel: Microsoft-Windows-LSA/Operational
windows product: windows
service: msexchange-management
Channel: MSExchange Management
windows product: windows
service: ntfs
Channel: Microsoft-Windows-Ntfs/Operational
windows product: windows
service: ntlm
Channel: Microsoft-Windows-NTLM/Operational
windows product: windows
service: openssh
Channel: OpenSSH/Operational
windows product: windows
service: powershell
Channel: Microsoft-Windows-PowerShell/Operational
windows product: windows
service: powershell-classic
Channel: Windows PowerShell
windows product: windows
service: printservice-admin
Channel: Microsoft-Windows-PrintService/Admin
windows product: windows
service: printservice-operational
Channel: Microsoft-Windows-PrintService/Operational
windows product: windows
service: security
Channel: Security
windows product: windows
service: security-mitigations
Channel:
- Microsoft-Windows-Security-Mitigations/Kernel Mode
- Microsoft-Windows-Security-Mitigations/User Mode
windows product: windows
service: sense
Channel: Microsoft-Windows-SENSE/Operational
windows product: windows
service: servicebus-client
Channel:
- Microsoft-ServiceBus-Client/Operational
- Microsoft-ServiceBus-Client/Admin
windows product: windows
service: shell-core
Channel: Microsoft-Windows-Shell-Core/Operational
windows product: windows
service: smbclient-security
Channel: Microsoft-Windows-SmbClient/Security
windows product: windows
service: sysmon
Channel: Microsoft-Windows-Sysmon/Operational
windows product: windows
service: system
Channel: System
windows product: windows
service: taskscheduler
Channel: Microsoft-Windows-TaskScheduler/Operational
windows product: windows
service: terminalservices-localsessionmanager
Channel: Microsoft-Windows-TerminalServices-LocalSessionManager/Operational
windows product: windows
service: vhdmp
Channel: Microsoft-Windows-VHDMP/Operational
windows product: windows
service: windefend
Channel: Microsoft-Windows-Windows Defender/Operational
windows product: windows
service: wmi
Channel: Microsoft-Windows-WMI-Activity/Operational

Fields

Generic

Process Creation Events

Process creation events can be defined with the generic log source category process_creation. The event scope can be further restricted with product. Example for a process creation event log source restricted to Windows:

category: process_creation
product: windows

The field names follow the field names used in Sysmon events:

Field Name Example Value Comment
UtcTime 2019-03-02 08:51:00.008
ProcessGuid {c1b49677-43f4-5c7a-0000-0010d3dd8044}
ProcessId 1028
Image C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
FileVersion 1.3.28.13
Description Google Installer
Product Google Update
Company Google Inc.
CommandLine "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource scheduler
CurrentDirectory C:\Windows\system32|
User NT AUTHORITY\SYSTEM
LogonGuid {c1b49677-3fb9-5c09-0000-0020e7030000}
LogonId 0x3e7
TerminalSessionId 0
IntegrityLevel System
imphash E96A73C7BF33A464C510EDE582318BF2
md5 CCF1D1573F175299ADE01C07791A6541
sha1 0AE1F9071C5E8FE4A69D3F671937935D242D8A6C
sha256 68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2
ParentProcessGuid {c1b49677-6b43-5c78-0000-00107fb77544}
ParentProcessId 1724
ParentImage C:\Windows\System32\taskeng.exe
ParentCommandLine taskeng.exe {88F94E5C-5DC3-4606-AEFA-BDCA976D6113} S-1-5-18:NT AUTHORITY\System:Service:

Other Generic Rule Categories

We align our field names to the field names that Sysmon uses. You can find all possible field values in the Sysmon Community Guide and on UltimateWindowsSecurity.com.

Specific

  • product: windows: Windows Operating System logs. The naming of Windows Eventlog attributes is used in Sigma rules.
    • service: security: Windows Security Event Log. Some may be covered by generic log sources.
    • service: system: Windows System Event Log
    • service: sysmon: Event Logs created by Sysmon. Some may be covered by generic log sources.
    • service: taskscheduler
    • service: wmi
    • service: application
    • service: dns-server
    • service: driver-framework
    • service: powershell
    • service: powershell-classic
  • product: linux: Linux log files
    • service: auth: Linux authentication logs. Usually /var/log/auth.log.
    • service: auditd: Linux audit logs
    • service: clamav: ClamAV logs
  • product: apache: Apache httpd logs
    • service: access: Access logs
    • service: error: Error logs
  • category: proxy
    • Field Name according to W3C Extended Log File Format. Additional W3 examples can be found from Microsoft.
    • Field names:
      • c-uri: URL requested by client
      • c-uri-extension: Extension of the URL. Commonly is the requested extension of a file name
      • c-uri-query: Path component of requested URL
      • c-uri-stem: Stem of the requested URL
      • c-useragent: the clients user agent.
      • cs-bytes: Number of bytes sent from the server
      • cs-cookie: Cookie headers sent from client to server.
      • cs-host: Host header send from client to server
      • cs-method: HTTP request method
      • r-dns: The Domain requested. Additionally is referred to as the Host header or URL Domain. Recommend to use cs-host instead of this field
      • cs-referrer: The referring link or site
      • cs-version: The HTTP protocol version that the client used
      • sc-bytes: Number of bytes sent from the client
      • sc-status: The HTTP status code
      • src_ip: The IP address of the client that made the request
      • dst_ip: The IP address of the server
  • category: firewall
    • Field Names:
      • src_ip, src_port, dst_ip, dst_port, username
  • category: dns
  • category: webserver
    • date: The date that the activity occurred.
    • time: The time that the activity occurred.
    • c-ip:The IP address of the client that accessed your server.
    • cs-username: The name of the authenticated user who accessed your server. This does not include anonymous users, who are represented by a hyphen (-).
    • s-sitename: The Internet service and instance number that was accessed by a client.
    • s-computername: The name of the server on which the log entry was generated.
    • s-ip: The IP address of the server on which the log entry was generated.
    • s-port: The port number the client is connected to.
    • cs-method: The action the client was trying to perform (for example, a GET method).
    • cs-uri-stem: The resource accessed; for example, Default.htm.
    • cs-uri-query: The query, if any, the client was trying to perform.
    • sc-status: The status of the action, in HTTP or FTP terms.
    • c-win32-status: The status of the action, in terms used by Microsoft Windows®.
    • sc-bytes: The number of bytes sent by the server.
    • cs-bytes: The number of bytes received by the server.
    • time-taken: The duration of time, in milliseconds, that the action consumed.
    • cs-version: The protocol (HTTP, FTP) version used by the client. For HTTP this will be either HTTP 1.0 or HTTP 1.1.
    • cs-host: Displays the content of the host header.
    • cs-user-agent: The browser used on the client.
    • cs-cookie: The content of the cookie sent or received, if any.
    • cs-referer: The previous site visited by the user. This site provided a link to the current site.
  • product: antivirus
    • Field Names:
      • Filename: the name and path of the source threat file
      • Signature: name of the threat like "EICAR-Test-File"
      • Action: action take by the antivirus like "delete"

History

  • 2024-11-01 Taxonomy Appendix v v2.0.2
    • Add new windows services:
      • service: iis-configuration
  • 2024-08-11 Taxonomy Appendix v v2.0.1
    • Restructure the document for a better reading experience
  • 2024-08-08 Taxonomy Appendix v v2.0.0
    • Fix the following windows services:
      • Change ldap_debug to ldap
    • Add new windows services:
      • service: application-experience
      • service: capi2
      • service: certificateservicesclient-lifecycle-system
      • service: hyper-v-worker
      • service: kernel-event-tracing
      • service: kernel-shimengine
      • service: ntfs
      • service: sense
      • service: servicebus-client
  • 2023-01-21 Taxonomy Appendix v1.3.5
    • Add new product and its related service:
      • product: github
      • service: audit
  • 2023-01-18 Taxonomy Appendix v1.3.4
    • Add the following new windows services:
      • service: appxdeployment-server
      • service: lsa-server
      • service: appxpackaging-om
      • service: dns-client
      • service: appmodel-runtime
      • service: vhdmp
    • Add new cisco services:
      • service: bgp
      • service: ldp
    • Add new huawei service: bgp
    • Add new juniper service: bgp
    • Add missing category folder
    • Add missing product folder
    • Add description for a special case when using only the product logsource
  • 2023-01-03 Taxonomy Appendix v1.3.3
    • Add windows service dns-server-analytic and bitlocker
    • Add all the W3C fields names to the category webserver
    • Update linux file_create category to file_event
  • 2022-12-19 Taxonomy Appendix v1.3.2
    • Minor tweak and updates to the syntax and text
  • 2022-11-13 Taxonomy Appendix v1.3.1
    • Add missing service shell-core
  • 2022-11-01 Taxonomy Appendix v1.3.0
    • Add missing windows services
  • 2022-10-25 Taxonomy Appendix v1.2.0
    • Order the windows logs
  • 2022-10-19 Taxonomy Appendix v1.1.0
    • Fix links and spelling
  • 2022-09-18 Taxonomy v1.0.0
    • Initial release