Skip to content

logpoint/pySigma-backend-logpoint

Repository files navigation

pySigma Logpoint Backend

Tests Coverage Badge Status

Overview

This is the Logpoint backend for pySigma. It provides the package sigma.backends.logpoint with the Logpoint class. Further, it contains the processing pipieline sigma.pipelines.logpoint, which performs field mapping and error handling.

The sigma.pipelines.logpoint module includes the following processing pipelines:

  • logpoint_windows: This pipeline is designed to convert Sigma rules into queries specifically tailored for the Windows event logging format used by Logpoint.
  • logpoint_linux: This pipeline is designed to convert Sigma rules into queries specifically tailored for the Linux event logging format used by Logpoint.
  • logpoint_azure: This pipeline is designed to convert Sigma rules into queries specifically tailored for the Azure event logging format used by Logpoint
  • logpoint_o365: This pipeline is designed to convert Sigma rules into queries specifically tailored for the Office 365 event logging format used by Logpoint
  • logpoint_defer_contains: This pipeline defer the Sigma contains keyword into eval expression. Useful when default query can't fetch the events and results in search timeout due to large number of wildcard searches. This optional pipeline can be used with in addition to other logpoint pipelines.

Rule Support

The Logpoint backend supports the following log sources/rule types:

  • Windows Sysmon
  • Windows
  • Azure
  • M365
  • Linux

Usage example

SigConverter (Sigma Rule Converter)

  1. Open sigconverter: sigconverter.io
  2. In Backend, select logpoint.
  3. In Pipeline, choose the Logpoint pipeline that matches your data source:
    • logpoint_windows
    • logpoint_azure
    • logpoint_o365
  4. (Optional) Add logpoint_defer_contains in addition to one of the pipelines above to defer Sigma contains into an eval expression. This can help reduce wildcard-heavy searches that may lead to timeouts.
  5. Paste your Sigma rule into the editor (e.g., rule.yml).
  6. The converted Logpoint query will appear in the output panel—copy it as needed.

Sigma CLI

Requirements

  1. To use Sigma CLI (the Sigma Rule Converter) and its underlying library, ensure you have Python version 3.10 or higher installed.
  2. Install dependent pysigma.
pip3 install pysigma
  1. Install sigma-cli, command line tool for sigma rule conversion
pip3 install sigma-cli
  1. After installing Sigma CLI, you need to add the Logpoint backend plugin. Choose one of the following methods:
sigma plugin install logpoint

OR

pip3 install pysigma-backend-logpoint

Converting Sigma Rules

Once the packages are successfully installed, you can convert Sigma rules into Logpoint queries using the command below. For example, to convert the Suspicious Process Masquerading As SvcHost.EXE

sigma convert -t logpoint -p logpoint_windows rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml

Output

╭─ubuntu@ubuntu
╰─$ sigma convert -t logpoint -p logpoint_windows rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml
Parsing Sigma rules  [####################################]  100%
label="Create" label="Process" "process"="*\svchost.exe" - ("process" IN ["C:\Windows\System32\svchost.exe", "C:\Windows\SysWOW64\svchost.exe"] OR file="svchost.exe")

Limitations and Constraints

This backend is in its preliminary stage, which means there may be issues with query conversion from uncommon log types and it does not yet support conversion from all log sources covered by Sigma. Attempting to convert such rule types may result in an error.

This backend is currently maintained by Logpoint, with contributions from the following individuals:

Report Issues

If you encounter any issues, please don't hesitate to open a new issue.

About

Logpoint backend for pySigma that enables seamless conversion of Sigma rules into Logpoint queries.

Resources

License

Stars

Watchers

Forks

Contributors

Languages