Sigma Detection Knowledge Base

Knowledge Base

Reference documentation for Sigma detection engineering - log source taxonomy, detection language modifiers, and community rule conventions, all sourced from the SigmaHQ specification.

30 products · 36 categories99 / 110 logsources active
110 logsources
Windows54
Process Creation
windows / process_creation
1,398 rules

Logs new process creation events. The most widely used Sysmon category.

EventID: 1
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: process_creation
ImageCommandLineParentImageParentCommandLineUserCurrentDirectory+2 more
File Change (Timestomping)
windows / file_change
2 rules

Logs file creation time changes. Useful for detecting timestomping attacks.

EventID: 2
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: file_change
TargetFilenameCreationUtcTimePreviousCreationUtcTime
Network Connection
windows / network_connection
61 rules

Logs outbound TCP/UDP network connections made by processes.

EventID: 3
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: network_connection
ImageDestinationIpDestinationPortDestinationHostnameProtocolUser
Process Termination
windows / process_termination

Logs process termination events.

EventID: 5
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: process_termination
ImageProcessIdUtcTime
Driver Load
windows / driver_load
10 rules

Logs when a driver is loaded. Critical for detecting vulnerable or malicious kernel drivers.

EventID: 6
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: driver_load
ImageLoadedHashesSignedSignatureSignatureStatus
Image Load (DLL)
windows / image_load
122 rules

Logs when a DLL or executable image is loaded into a process.

EventID: 7
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: image_load
ImageImageLoadedSignedSignatureOriginalFileName
Remote Thread Creation
windows / create_remote_thread
15 rules

Logs when a process creates a thread in another process - a common injection technique.

EventID: 8
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: create_remote_thread
SourceImageTargetImageStartAddressStartModuleStartFunction
Raw Access Thread
windows / raw_access_thread
1 rules

Logs when a process reads raw access to the disk, used to bypass file system filters.

EventID: 9
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: raw_access_thread
ImageDevice
Process Access (LSASS)
windows / process_access
29 rules

Logs when a process opens another process, often used to detect credential dumping (e.g., LSASS access).

EventID: 10
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: process_access
SourceImageTargetImageGrantedAccessCallTrace
File Creation Event
windows / file_event
216 rules

Logs when a new file is created on the filesystem.

EventID: 11
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: file_event
ImageTargetFilenameCreationUtcTime
Registry Events (Add/Delete/Set)
windows / registry_event
41 rules

Logs registry key and value operations. Covers EventIDs 12 (add/delete), 13 (set), 14 (rename).

EventID: 12–14
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: registry_event
EventTypeImageTargetObjectDetails
Alternate Data Stream
windows / create_stream_hash
9 rules

Logs when a named file stream is created. Used to detect ADS-based persistence.

EventID: 15
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: create_stream_hash
ImageTargetFilenameContents
Named Pipe Created
windows / pipe_created
19 rules

Logs named pipe creation and connection events.

EventID: 17–18
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: pipe_created
ImagePipeName
WMI Event Activity
windows / wmi_event
3 rules

Logs WMI filter registration, consumer binding - critical for detecting WMI persistence.

EventID: 19–21
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: wmi_event
EventNamespaceNameQueryConsumerFilter
DNS Query
windows / dns_query
27 rules

Logs DNS queries made by processes. Essential for C2 and DGA detection.

EventID: 22
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: dns_query
ImageQueryNameQueryResultsQueryStatus
File Delete (Archived)
windows / file_delete
14 rules

Logs when a file is deleted - Sysmon archives a copy in the DeletedFiles directory.

EventID: 23
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: file_delete
ImageTargetFilenameHashesIsExecutable
Clipboard Capture
windows / clipboard_capture

Logs clipboard content captured by processes.

EventID: 24
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: clipboard_capture
ImageSessionClientInfoHashes
Process Tampering
windows / process_tampering
1 rules

Logs process hollowing, herpaderping, and similar injection techniques.

EventID: 25
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: process_tampering
ImageType
PowerShell Script Block
windows / ps_script
178 rules

Logs PowerShell script block execution. Essential for detecting obfuscated PS execution.

EventID: 4104
Microsoft-Windows-PowerShell/Operational
logsource:
  product: windows
  category: ps_script
ScriptBlockTextPath
PowerShell Module
windows / ps_module
34 rules

Logs PowerShell module loading events.

EventID: 4103
Microsoft-Windows-PowerShell/Operational
logsource:
  product: windows
  category: ps_module
PayloadScriptName
PowerShell Classic (v2)
windows / ps_classic_script

Logs classic Windows PowerShell v2 pipeline execution.

EventID: 800
Windows PowerShell
logsource:
  product: windows
  category: ps_classic_script
HostApplicationCommandLine
File Delete Detected
windows / file_delete_detected

Logs detected file deletions where archive is disabled.

EventID: 26
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: file_delete_detected
ImageTargetFilenameIsExecutable
File Access (ETW)
windows / file_access
13 rules

Logs file read operations via ETW kernel provider.

Microsoft-Windows-Kernel-File (ETW)
logsource:
  product: windows
  category: file_access
ImageTargetFilename
File Rename (ETW)
windows / file_rename
2 rules

Logs file rename operations via ETW kernel provider.

Microsoft-Windows-Kernel-File (ETW)
logsource:
  product: windows
  category: file_rename
ImageTargetFilename
Sysmon Status / Config
windows / sysmon_status
1 rules

Logs Sysmon service state changes and configuration updates.

EventID: 4, 16
Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  category: sysmon_status
StateSchemaVersionConfiguration
Security Event Log
windows / security
163 rules

Windows Security audit log. Covers logons (4624/4625), privilege use, object access, and account management.

Security
logsource:
  product: windows
  service: security
EventIDSubjectUserNameTargetUserNameLogonTypeIpAddress
System Event Log
windows / system
74 rules

Windows System event log covering service installations, driver errors, and system-level events.

System
logsource:
  product: windows
  service: system
EventIDProvider_NameServiceNameImagePath
Sysmon (Service)
windows / sysmon
4 rules

Generic Sysmon channel selector (use category-based logsources for specific event types).

Microsoft-Windows-Sysmon/Operational
logsource:
  product: windows
  service: sysmon
PowerShell Operational
windows / powershell

Windows PowerShell operational log - engine lifecycle, command execution, remoting.

Microsoft-Windows-PowerShell/Operational
logsource:
  product: windows
  service: powershell
EventIDPayloadHostApplication
PowerShell Classic
windows / powershell-classic
3 rules

Legacy Windows PowerShell v2 log. Use ps_script/ps_module categories when possible.

Windows PowerShell
logsource:
  product: windows
  service: powershell-classic
Application Event Log
windows / application
31 rules

Windows Application event log for software-level events.

Application
logsource:
  product: windows
  service: application
Windows Defender
windows / windefend
16 rules

Windows Defender antivirus and antimalware detection events.

Microsoft-Windows-Windows Defender/Operational
logsource:
  product: windows
  service: windefend
EventIDThreatNameSeverityIDPathActionID
Task Scheduler
windows / taskscheduler
4 rules

Windows Task Scheduler operational log - task creation, modification, execution.

Microsoft-Windows-TaskScheduler/Operational
logsource:
  product: windows
  service: taskscheduler
EventIDTaskNameUserContextResultCode
WMI Activity
windows / wmi
1 rules

Windows Management Instrumentation activity log.

Microsoft-Windows-WMI-Activity/Operational
logsource:
  product: windows
  service: wmi
EventIDOperationUserClientMachine
AppLocker
windows / applocker
1 rules

AppLocker allow/deny events for EXEs, DLLs, scripts, and packaged apps.

Microsoft-Windows-AppLocker/*
logsource:
  product: windows
  service: applocker
EventIDPolicyNameRuleIdFilePathFqbn
Windows Firewall (Advanced)
windows / firewall-as
9 rules

Windows Firewall with Advanced Security connection events.

Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
logsource:
  product: windows
  service: firewall-as
EventIDDirectionSourceAddressDestAddressDestPortApplication
DNS Server
windows / dns-server
2 rules

Windows DNS Server query and response logging.

DNS Server
logsource:
  product: windows
  service: dns-server
EventIDQNAMEQTYPEQXIDSource
DNS Client Events
windows / dns-client
6 rules

Client-side DNS resolution events.

Microsoft-Windows-DNS Client Events/Operational
logsource:
  product: windows
  service: dns-client
NTLM Authentication
windows / ntlm
3 rules

NTLM authentication operational log - useful for Pass-the-Hash detection.

Microsoft-Windows-NTLM/Operational
logsource:
  product: windows
  service: ntlm
LSA Server
windows / lsa-server
1 rules

Local Security Authority server operational log.

Microsoft-Windows-LSA/Operational
logsource:
  product: windows
  service: lsa-server
CAPI2 (Certificate)
windows / capi2
1 rules

Cryptographic API 2 certificate operations - certificate verification and chain building.

Microsoft-Windows-CAPI2/Operational
logsource:
  product: windows
  service: capi2
BITS Client
windows / bits-client
7 rules

Background Intelligent Transfer Service - often abused for persistence and C2.

Microsoft-Windows-Bits-Client/Operational
logsource:
  product: windows
  service: bits-client
Security Mitigations
windows / security-mitigations
2 rules

Windows Defender exploit protection and security mitigation events.

Microsoft-Windows-Security-Mitigations/*
logsource:
  product: windows
  service: security-mitigations
OpenSSH Server
windows / openssh
1 rules

Windows OpenSSH server authentication and session log.

OpenSSH/Operational
logsource:
  product: windows
  service: openssh
EventIDpayload
MS Exchange Management
windows / msexchange-management
8 rules

Microsoft Exchange Server management shell command audit log.

MSExchange Management
logsource:
  product: windows
  service: msexchange-management
CmdletNameParametersCallerFullCommandName
RDP / Terminal Services
windows / terminalservices-localsessionmanager
1 rules

Remote Desktop / Terminal Services local session manager events.

Microsoft-Windows-TerminalServices-LocalSessionManager/Operational
logsource:
  product: windows
  service: terminalservices-localsessionmanager
EventIDUserSessionIDAddress
Kernel ETW Tracing
windows / kernel-event-tracing

Windows Kernel Event Tracing provider events.

Microsoft-Windows-Kernel-EventTracing
logsource:
  product: windows
  service: kernel-event-tracing
Code Integrity
windows / codeintegrity-operational
10 rules

Windows Code Integrity driver/image verification failures - WHQL bypass detection.

Microsoft-Windows-CodeIntegrity/Operational
logsource:
  product: windows
  service: codeintegrity-operational
Print Service
windows / printservice-operational
1 rules

Windows Print Spooler service operational log - used in PrintNightmare detection.

Microsoft-Windows-PrintService/Operational
logsource:
  product: windows
  service: printservice-operational
BitLocker
windows / bitlocker

BitLocker drive encryption management events.

Microsoft-Windows-BitLocker/BitLocker Management
logsource:
  product: windows
  service: bitlocker
Shell Core
windows / shell-core
1 rules

Windows shell core operational events.

Microsoft-Windows-Shell-Core/Operational
logsource:
  product: windows
  service: shell-core
SMB Client Security
windows / smbclient-security
1 rules

SMB client security event log - access denied, signing errors.

Microsoft-Windows-SmbClient/Security
logsource:
  product: windows
  service: smbclient-security
IIS Configuration
windows / iis-configuration
4 rules

Microsoft IIS configuration operational events.

Microsoft-IIS-Configuration/Operational
logsource:
  product: windows
  service: iis-configuration
Microsoft Defender for Endpoint
windows / sense

Microsoft Defender for Endpoint (SENSE) operational events.

Microsoft-Windows-SENSE/Operational
logsource:
  product: windows
  service: sense
Linux12
Process Creation (Sysmon)
linux / process_creation
139 rules

Linux process creation via Sysmon for Linux (EventID 1).

EventID: 1 (Sysmon)
logsource:
  product: linux
  category: process_creation
ImageCommandLineParentImageUser
Network Connection (Sysmon)
linux / network_connection
5 rules

Linux network connections via Sysmon for Linux (EventID 3).

EventID: 3 (Sysmon)
logsource:
  product: linux
  category: network_connection
ImageDestinationIpDestinationPortUser
File Event (Sysmon)
linux / file_event
17 rules

Linux file creation events via Sysmon for Linux (EventID 11).

EventID: 11 (Sysmon)
logsource:
  product: linux
  category: file_event
ImageTargetFilename
Linux Audit (auditd)
linux / auditd
53 rules

Linux kernel audit subsystem log. Covers syscalls, file access, user auth, and more.

/var/log/audit/audit.log
logsource:
  product: linux
  service: auditd
typesyscallexecommkeyproctitle
Linux Auth Log
linux / auth
1 rules

Linux authentication log. Covers SSH logins, sudo, PAM, and su events.

/var/log/auth.log
logsource:
  product: linux
  service: auth
hostnameidentpidmessage
SSH Daemon (sshd)
linux / sshd
3 rules

OpenSSH server log - accepted/failed logins, key-based auth, tunnels.

logsource:
  product: linux
  service: sshd
hostnameidentpidmessage
sudo
linux / sudo
1 rules

Linux sudo command audit log - privilege escalation attempts.

logsource:
  product: linux
  service: sudo
hostnameidentpidmessage
cron / Scheduled Tasks
linux / cron
1 rules

Linux cron daemon log - scheduled job execution, new crontab entries.

logsource:
  product: linux
  service: cron
syslog
linux / syslog
2 rules

Generic Linux syslog. Catch-all for kernel, daemon, and application messages.

/var/log/syslog
logsource:
  product: linux
  service: syslog
ClamAV
linux / clamav
1 rules

ClamAV open-source antivirus detection events on Linux.

logsource:
  product: linux
  service: clamav
vsftpd (FTP)
linux / vsftpd
1 rules

Very Secure FTP Daemon log - FTP session and transfer events.

logsource:
  product: linux
  service: vsftpd
Apache Guacamole
linux / guacamole
1 rules

Apache Guacamole clientless remote desktop gateway session log.

logsource:
  product: linux
  service: guacamole
macOS2
Process Creation
macos / process_creation
70 rules

macOS process creation events.

logsource:
  product: macos
  category: process_creation
ImageCommandLineParentImageUser
File Event
macos / file_event
5 rules

macOS file creation and modification events.

logsource:
  product: macos
  category: file_event
ImageTargetFilename
Cloud17
AWS CloudTrail
aws / cloudtrail
55 rules

AWS API call audit log. Covers all AWS service API calls - IAM, EC2, S3, Lambda, and more.

logsource:
  product: aws
  service: cloudtrail
eventNameeventSourceuserIdentity.arnrequestParameterssourceIPAddress
Azure Activity Logs
azure / activitylogs
42 rules

Azure subscription-level operations - resource management, policy events.

logsource:
  product: azure
  service: activitylogs
operationNameresourceTypecallerstatus
Azure AD Audit Logs
azure / auditlogs
38 rules

Azure Active Directory audit events - user creation, group changes, app registration.

logsource:
  product: azure
  service: auditlogs
operationTypetargetResourcesinitiatedByresult
Azure AD Sign-in Logs
azure / signinlogs
24 rules

Azure AD authentication events - successful and failed sign-ins, MFA challenges.

logsource:
  product: azure
  service: signinlogs
userDisplayNameipAddressstatusclientAppUsedconditionalAccessStatus
Azure AD Risk Detections
azure / riskdetection
19 rules

Azure AD Identity Protection risk detection events.

logsource:
  product: azure
  service: riskdetection
Azure PIM
azure / pim
7 rules

Azure Privileged Identity Management events - role activation and assignment.

logsource:
  product: azure
  service: pim
GCP Audit Logs
gcp / gcp.audit
16 rules

Google Cloud Platform audit log - admin activity, data access, system events.

logsource:
  product: gcp
  service: gcp.audit
protoPayload.methodNameprotoPayload.authenticationInforesource.type
Google Workspace Admin
gcp / google_workspace.admin
7 rules

Google Workspace (G Suite) admin audit log - org-wide settings, user management.

logsource:
  product: gcp
  service: google_workspace.admin
M365 Unified Audit Log
m365 / audit
5 rules

Microsoft 365 unified audit log - activity across Exchange, SharePoint, Teams, and more.

logsource:
  product: m365
  service: audit
OperationUserIdClientIPObjectIdWorkload
Microsoft Exchange Online
m365 / exchange
1 rules

Exchange Online mailbox audit and message tracking events.

logsource:
  product: m365
  service: exchange
M365 Threat Detection
m365 / threat_detection
1 rules

Microsoft 365 Defender threat detection and incident events.

logsource:
  product: m365
  service: threat_detection
M365 Threat Management
m365 / threat_management
13 rules

Microsoft 365 Defender threat management actions and policies.

logsource:
  product: m365
  service: threat_management
Okta System Log
okta / okta
23 rules

Okta identity platform system log - authentication, authorization, lifecycle events.

logsource:
  product: okta
  service: okta
eventTypeoutcome.resultactor.alternateIdclient.ipAddress
GitHub Organization Audit
github / audit
15 rules

GitHub organization-level audit log - repo creation, team changes, secret scanning.

logsource:
  product: github
  service: audit
actionactorrepoorg_document_id
Bitbucket Audit
bitbucket / audit
14 rules

Atlassian Bitbucket organization audit log.

logsource:
  product: bitbucket
  service: audit
Cisco Duo MFA
cisco / duo
1 rules

Cisco Duo Security MFA authentication and admin events.

logsource:
  product: cisco
  service: duo
eventtyperesultuser.nameaccess_device.ipapplication.name
OneLogin Events
onelogin / onelogin.events
2 rules

OneLogin identity provider event log.

logsource:
  product: onelogin
  service: onelogin.events
Network11
Zeek HTTP
zeek / http
5 rules

Zeek network sensor HTTP connection log.

logsource:
  product: zeek
  service: http
id.orig_hid.resp_hid.resp_pmethoduristatus_code+1 more
Zeek DNS
zeek / dns
5 rules

Zeek network sensor DNS query and response log.

logsource:
  product: zeek
  service: dns
id.orig_hqueryqtype_nameanswers
Zeek Kerberos
zeek / kerberos
1 rules

Zeek network sensor Kerberos authentication log - AS-REQ, TGS-REQ.

logsource:
  product: zeek
  service: kerberos
id.orig_hclientservicesuccesserror_msgcipher
Zeek RDP
zeek / rdp
1 rules

Zeek RDP (Remote Desktop Protocol) connection log.

logsource:
  product: zeek
  service: rdp
id.orig_hid.resp_hcookieresultencryption_method
Zeek SMB Files
zeek / smb_files
7 rules

Zeek SMB (Server Message Block) file operations log.

logsource:
  product: zeek
  service: smb_files
id.orig_hid.resp_hpathnameaction
Zeek DCE/RPC
zeek / dce_rpc
4 rules

Zeek DCE/RPC (Distributed Computing Environment) log - common for lateral movement.

logsource:
  product: zeek
  service: dce_rpc
id.orig_hid.resp_hrttnamed_pipeendpointoperation
Zeek X.509 Certificates
zeek / x509
1 rules

Zeek TLS certificate inspection log.

logsource:
  product: zeek
  service: x509
certificate.subjectcertificate.issuercertificate.not_valid_aftersan.dns
Cisco AAA
cisco / aaa
12 rules

Cisco Authentication, Authorization, and Accounting log.

logsource:
  product: cisco
  service: aaa
Cisco BGP
cisco / bgp
1 rules

Cisco router BGP (Border Gateway Protocol) events.

logsource:
  product: cisco
  service: bgp
Generic Network Connection
network / connection

Generic network connection events. Technology-agnostic firewall/flow log source.

logsource:
  category: network
  service: connection
source.ipsource.portdestination.ipdestination.portnetwork.transportnetwork.protocol
Generic DNS Query
network / dns

Generic DNS query events. Technology-agnostic DNS log source.

logsource:
  category: network
  service: dns
source.ipdns.question.namedns.question.typedns.answers.datadns.response.code
Application8
Django Framework
django / application
1 rules

Django Python web framework application log. Keyword-based rules.

logsource:
  product: django
  category: application
Python Runtime
python / application
1 rules

Generic Python application/runtime log. Keyword-based rules.

logsource:
  product: python
  category: application
RPC Firewall
rpc_firewall / application
17 rules

RPCFW (RPC Firewall) application log for Windows RPC call monitoring.

logsource:
  product: rpc_firewall
  category: application
Ruby on Rails
ruby_on_rails / application
1 rules

Ruby on Rails web framework application log. Keyword-based rules.

logsource:
  product: ruby_on_rails
  category: application
Spring Framework
spring / application
2 rules

Java Spring Framework application log. Keyword-based rules.

logsource:
  product: spring
  category: application
SQL Database
sql / application
1 rules

SQL query audit log (DROP, SELECT, …). Covers various SQL database systems.

logsource:
  product: sql
  category: application
queryuserdatabaseclient
Apache HTTP Server
apache
2 rules

Apache httpd error.log and access.log.

logsource:
  service: apache
c-ipcs-methodcs-uri-stemsc-statuscs(User-Agent)
ModSecurity WAF
modsecurity

ModSecurity Web Application Firewall detection and audit log.

logsource:
  product: modsecurity
Generic6
Antivirus
antivirus
7 rules

Generic antivirus detection message. Vendor-neutral - format depends on the AV product.

logsource:
  category: antivirus
FilenameSignatureAction
Database
database
1 rules

Generic SQL query log (DROP, SELECT, …). Vendor-neutral database log source.

logsource:
  category: database
queryuserdatabase
DNS (Generic)
dns
11 rules

Generic DNS query/response log. Vendor-neutral - matches any DNS data source.

logsource:
  category: dns
Firewall (Generic)
firewall
2 rules

Generic firewall allow/deny log. Vendor-neutral network perimeter log source.

logsource:
  category: firewall
src_ipsrc_portdst_ipdst_portusername
Web Proxy (Generic)
proxy
55 rules

Generic web proxy log. Uses W3C Extended Log Format field names.

logsource:
  category: proxy
c-urics-methodcs-hostsc-statusc-useragentsrc_ip
Web Server (Generic)
webserver
82 rules

Generic web server access log. Vendor-neutral - IIS, Apache, nginx, etc.

logsource:
  category: webserver
c-ipcs-usernamecs-methodcs-uri-stemsc-statuscs-user-agent