{"id":16430,"date":"2023-03-24T13:51:57","date_gmt":"2023-03-24T12:51:57","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=16430"},"modified":"2024-12-17T12:44:21","modified_gmt":"2024-12-17T11:44:21","slug":"demystifying-sigma-log-sources","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/","title":{"rendered":"Demystifying SIGMA Log Sources"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>One of the main goals of Sigma as a project and Sigma rules specifically has always been to reduce the gap that existed in the detection rules space. As maintainers of the Sigma rule repository we&#8217;re always striving for reducing that gap and making robust and actionable detections accessible and available to everyone for free.<\/p>\n<p>Today we&#8217;re introducing a new contribution to the Sigma project called <strong>log-source guides<\/strong>. The idea behind it is to provide specific guides on configuring a system&#8217;s audit policies so that the system actually creates the logs needed by the rules. An adequate audit policy is a crucial dependency often overlooked when deploying Sigma rules.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-24-at-13.55.58.png&#8221; title_text=&#8221;Screenshot 2023-03-24 at 13.55.58&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;SIGMA Logsource Section&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2>SIGMA Log-Source<\/h2>\n<p>Before we delve deeper, Let&#8217;s take a step back and talk a bit about how the <strong>log-source<\/strong> attribute is used in Sigma rules.<\/p>\n<p>Every Sigma rule requires a section called <strong>log-source <\/strong>that indicates as the name suggests, the log source on which this detection will fire. A typical example would look like this:<\/p>\n<pre>product: windows\ncategory: process_creation\n\n<\/pre>\n<p>The &#8220;<strong>product&#8221;<\/strong> indicates that this rules is targeting the <strong>&#8220;Windows&#8221;<\/strong> product and a specific category called &#8220;<strong>process_creation&#8221; <\/strong>is used to indicate that this rule is using &#8220;<strong>Process Creation&#8221;<\/strong> events. You can read the full explanation of every field in the <a href=\"https:\/\/github.com\/SigmaHQ\/sigma-specification\/blob\/main\/Sigma_specification.md#log-source\">specification<\/a><\/p>\n<p>To someone who isn&#8217;t familiar with Sigma or logging a couple of question will arise:<\/p>\n<ul>\n<li>Is <strong>&#8220;Process Creation&#8221; <\/strong>category using events <strong>&#8220;Sysmon\/EventID 1&#8221;<\/strong> or maybe <strong>&#8220;Microsoft-Windows-Security-Auditing\/EventID 4688&#8221;<\/strong>?<\/li>\n<li>The next question that arises: How would we collect these logs?<\/li>\n<\/ul>\n<p>This is where the <strong>log-souce-guides<\/strong> enter the picture.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;LogSource Guide&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2><strong>-Log-Source Guides<\/strong><\/h2>\n<p>Starting from today, if you navigate to the Sigma main rule repository, you&#8217;ll see a new folder called <strong>&#8220;rules-documentation&#8221;<\/strong> this will be the location of the aforementioned <strong>&#8220;<a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/tree\/master\/documentation\/logsource-guides\">log-source-guides<\/a>&#8220;<\/strong> and future documentation projects teased <a href=\"https:\/\/twitter.com\/nas_bench\/status\/1636134506590552070\">here<\/a>.<\/p>\n<p>The log-source-guides will have a simple structure that reflects available log sources. So in the example of \u201cprocess_creation\u201d for the Windows product:<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16449 aligncenter size-full\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-11.53.28.png\" alt=\"\" width=\"1476\" height=\"106\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-11.53.28.png 1476w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-11.53.28-1280x92.png 1280w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-11.53.28-980x70.png 980w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-11.53.28-480x34.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1476px, 100vw\" \/><br \/><strong>Structure<\/strong><\/h3>\n<p>Now that we established the location of these guides, let&#8217;s talk about their structure and the information they provide. Every logsource guide will provide the following information:<\/p>\n<h4 dir=\"auto\" tabindex=\"-1\"><strong>Event Source(s)<\/strong><\/h4>\n<p>This section will describe the source(s) used by the log-source. As a quick way for the reader to know exactly which channel or ETW provider is required to be able to receive the events.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16452 alignnone size-full\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.23.43.png\" alt=\"\" width=\"982\" height=\"364\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.23.43.png 982w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.23.43-980x363.png 980w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.23.43-480x178.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 982px, 100vw\" \/><\/p>\n<h4 dir=\"auto\" tabindex=\"-1\"><strong>Logging Setup<\/strong><\/h4>\n<p>This section describe a step by step guide on how to enable the logging and which events are to be expected by enabling it. Let&#8217;s take the <strong>&#8220;Credential Validation&#8221;<\/strong> audit policy.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16453 aligncenter size-full\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.28.57.png\" alt=\"\" width=\"1070\" height=\"766\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.28.57.png 1070w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.28.57-980x702.png 980w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.28.57-480x344.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1070px, 100vw\" \/><\/p>\n<ul>\n<li>The &#8220;Subcategory GUID&#8221; is the GUID for this specific audit policy which can be used with the auditpol command to enable the log (as we&#8217;ll see in a little bit).<\/li>\n<li>&#8220;Provider&#8221; indicates the exact ETW provider that is responsible for emitting these events.<\/li>\n<li>&#8220;Channel&#8221; is the Event Log channel where the generated events are emitted.<\/li>\n<li>&#8220;Event Volume&#8221; indicates the amount of logs to be expected by enabling that audit category or EventID.<\/li>\n<li>&#8220;API Mapping&#8221; is a direct link to <a href=\"https:\/\/twitter.com\/jsecurity101\">jsecurity101<\/a><a href=\"https:\/\/github.com\/jsecurity101\/TelemetrySource\">TelemetrySource<\/a> project.<\/li>\n<li>&#8220;EventIDs&#8221; are the events generated by enabling the policy or log.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16454 alignnone size-full\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.39.40.png\" alt=\"\" width=\"2100\" height=\"938\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.39.40.png 2100w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.39.40-1280x572.png 1280w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.39.40-980x438.png 980w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.39.40-480x214.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 2100px, 100vw\" \/><\/p>\n<p>Next comes the section on how you\u2019ll be able to enable the log in question \u2013 in this example either via Group Policy or by using Auditpol.<\/p>\n<p>Note: This section will obviously be different depending on the logs. Enabling Sysmon logs will be different than enabling Security logs.<\/p>\n<h4 dir=\"auto\" tabindex=\"-1\"><strong>Full Event(s) List<\/strong><\/h4>\n<p>This section while not always be present and is meant to be a collection of all events generated by the event sources in question. It&#8217;s there as a quick reference for any event. As every event is linking to the MSDN documentation when possible.<\/p>\n<h4 dir=\"auto\" tabindex=\"-1\"><strong>Event Fields<\/strong><\/h4>\n<p>The last section contains the specific event fields used by every event. While this section will be complete for certain log sources such as \u201cprocess_creation\u201d, it\u2019s still a work in progress for logs such as security and will be populated over time.<\/p>\n<p>The idea behind this is to provide the fields that the event generates as a reference. Since SIGMA rules aim to be as close to the original logs as possible and leave field mapping to the back end.<\/p>\n<h3><strong>Linking Log-Source Guides and Rules<br \/><\/strong><\/h3>\n<p>To make these log-source guides easily accessible. Every Sigma rules will now link to their respective logsource documentation via a unique ID that will be added to the &#8220;definition&#8221; section. Here is an example:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16457 alignnone size-full\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.50.16.png\" alt=\"\" width=\"786\" height=\"158\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.50.16.png 786w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-22-at-23.50.16-480x96.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 786px, 100vw\" \/><\/p>\n<p>As part of this initial release documentation will be available for the for the following log-sources:<\/p>\n<ul>\n<li><strong>product: windows \/ service: security<\/strong><\/li>\n<li><strong>product: windows \/ category: process_creation<\/strong><\/li>\n<li><strong>product: windows \/ category: ps_module<\/strong><\/li>\n<li><strong>product: windows \/ category: ps_script<\/strong><\/li>\n<\/ul>\n<p>In the coming weeks and months we&#8217;ll keep adding more documentation to cover every available log-source.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;ScriptSection&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2><strong>Sigma Log-Source Checker<\/strong><\/h2>\n<p>As part of this release we&#8217;re also providing a new script we&#8217;re calling &#8220;<a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules-documentation\/tools\/sigma-logsource-checker.py\"><strong>sigma-logsource-checker<\/strong><\/a>&#8220;. The idea behind this script is to provide the user the ability to know which logs to enable based on the SIGMA rules they&#8217;re using.<\/p>\n<p>It takes a Sigma rules folder as input, parses all the used log-source and Event IDs and suggests the Audit policies and logging configurations that should be enabled.<\/p>\n<p>As an optional feature, It can also parse the XML output of gpresult<\/p>\n<pre>gpresult \/x [results.xml]\n<\/pre>\n<p>and then suggests configuration changes based on current policy:<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-24-at-13.05.39-1.png&#8221; title_text=&#8221;Screenshot 2023-03-24 at 13.05.39&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>Note: This version will only check the Security Audit policy and PowerShell log configuration. We&#8217;ll keep improving it as we go along.<\/p>\n<p>You can have a look at this today by visiting the <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\">Sigma HQ main repository<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the main goals of Sigma as a project and Sigma rules specifically has always been to reduce the gap that existed in the detection rules space. As maintainers of the Sigma rule repository we&#8217;re always striving for reducing that gap and making robust and actionable detections accessible and available to everyone for free. Today we&#8217;re introducing a new contribution to the Sigma project called log-source guides. The idea behind it is to provide specific guides on configuring a system&#8217;s audit policies so that the system actually creates the logs needed by the rules. An adequate audit policy is a crucial dependency often overlooked when deploying Sigma rules. &nbsp;SIGMA Log-Source Before we delve deeper, Let&#8217;s take a step back and talk a bit about how the log-source attribute is used in Sigma rules. Every Sigma rule requires a section called log-source that indicates as the name suggests, the log source on which this detection will fire. A typical example would look like this: product: windows category: process_creation The &#8220;product&#8221; indicates that this rules is targeting the &#8220;Windows&#8221; product and a specific category called &#8220;process_creation&#8221; is used to indicate that this rule is using &#8220;Process Creation&#8221; events. You can read [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":16487,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[749,46,1,87,549,264,269],"tags":[702,13,568,703,704,705,60,59,137],"class_list":["post-16430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-homepage","category-newsletter","category-nextron","category-security-monitoring","category-sigma","category-tool","category-tutorial","tag-coverage","tag-detection","tag-documentation","tag-log-sources","tag-logsource","tag-python","tag-siem","tag-sigma","tag-tool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Demystifying SIGMA Log Sources - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/\"},\"author\":{\"name\":\"Nasreddine Bencherchali\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/7e223f744dcf194f8968dc39bd17f152\"},\"headline\":\"Demystifying SIGMA Log Sources\",\"datePublished\":\"2023-03-24T12:51:57+00:00\",\"dateModified\":\"2024-12-17T11:44:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/\"},\"wordCount\":1349,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_synthwave_city_scape_blue_and_grey_colours_greek_lower_64ac71bb-47e9-493d-bc6c-a661d28549de.png\",\"keywords\":[\"coverage\",\"detection\",\"documentation\",\"log sources\",\"logsource\",\"python\",\"SIEM\",\"Sigma\",\"tool\"],\"articleSection\":[\"Homepage\",\"Newsletter\",\"Nextron\",\"Security Monitoring\",\"Sigma\",\"Tool\",\"Tutorial\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/\",\"name\":\"Demystifying SIGMA Log Sources - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_synthwave_city_scape_blue_and_grey_colours_greek_lower_64ac71bb-47e9-493d-bc6c-a661d28549de.png\",\"datePublished\":\"2023-03-24T12:51:57+00:00\",\"dateModified\":\"2024-12-17T11:44:21+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#primaryimage\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_synthwave_city_scape_blue_and_grey_colours_greek_lower_64ac71bb-47e9-493d-bc6c-a661d28549de.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_synthwave_city_scape_blue_and_grey_colours_greek_lower_64ac71bb-47e9-493d-bc6c-a661d28549de.png\",\"width\":1728,\"height\":864},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/7e223f744dcf194f8968dc39bd17f152\",\"name\":\"Nasreddine Bencherchali\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a6d61ece58e6aca71958c049fcdccc68?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a6d61ece58e6aca71958c049fcdccc68?s=96&d=mm&r=g\",\"caption\":\"Nasreddine Bencherchali\"},\"url\":\"https:\/\/www.nextron-systems.com\/author\/nasreddine\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Demystifying SIGMA Log Sources - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/"},"author":{"name":"Nasreddine Bencherchali","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/7e223f744dcf194f8968dc39bd17f152"},"headline":"Demystifying SIGMA Log Sources","datePublished":"2023-03-24T12:51:57+00:00","dateModified":"2024-12-17T11:44:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/"},"wordCount":1349,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_synthwave_city_scape_blue_and_grey_colours_greek_lower_64ac71bb-47e9-493d-bc6c-a661d28549de.png","keywords":["coverage","detection","documentation","log sources","logsource","python","SIEM","Sigma","tool"],"articleSection":["Homepage","Newsletter","Nextron","Security Monitoring","Sigma","Tool","Tutorial"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/","url":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/","name":"Demystifying SIGMA Log Sources - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#primaryimage"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_synthwave_city_scape_blue_and_grey_colours_greek_lower_64ac71bb-47e9-493d-bc6c-a661d28549de.png","datePublished":"2023-03-24T12:51:57+00:00","dateModified":"2024-12-17T11:44:21+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/2023\/03\/24\/demystifying-sigma-log-sources\/#primaryimage","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_synthwave_city_scape_blue_and_grey_colours_greek_lower_64ac71bb-47e9-493d-bc6c-a661d28549de.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_synthwave_city_scape_blue_and_grey_colours_greek_lower_64ac71bb-47e9-493d-bc6c-a661d28549de.png","width":1728,"height":864},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/7e223f744dcf194f8968dc39bd17f152","name":"Nasreddine Bencherchali","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a6d61ece58e6aca71958c049fcdccc68?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a6d61ece58e6aca71958c049fcdccc68?s=96&d=mm&r=g","caption":"Nasreddine Bencherchali"},"url":"https:\/\/www.nextron-systems.com\/author\/nasreddine\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/16430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=16430"}],"version-history":[{"count":38,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/16430\/revisions"}],"predecessor-version":[{"id":24603,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/16430\/revisions\/24603"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media\/16487"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=16430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=16430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=16430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}