This is the Logpoint backend for pySigma. It provides the package sigma.backends.logpoint with the Logpoint class.
Further, it contains the processing pipieline sigma.pipelines.logpoint, which performs field mapping and error handling.
The sigma.pipelines.logpoint module includes the following processing pipelines:
logpoint_windows: This pipeline is designed to convert Sigma rules into queries specifically tailored for the Windows event logging format used by Logpoint.logpoint_linux: This pipeline is designed to convert Sigma rules into queries specifically tailored for the Linux event logging format used by Logpoint.logpoint_azure: This pipeline is designed to convert Sigma rules into queries specifically tailored for the Azure event logging format used by Logpointlogpoint_o365: This pipeline is designed to convert Sigma rules into queries specifically tailored for the Office 365 event logging format used by Logpointlogpoint_defer_contains: This pipeline defer the Sigmacontainskeyword into eval expression. Useful when default query can't fetch the events and results in search timeout due to large number of wildcard searches. This optional pipeline can be used with in addition to other logpoint pipelines.
The Logpoint backend supports the following log sources/rule types:
- Windows Sysmon
- Windows
- Azure
- M365
- Linux
- Open sigconverter: sigconverter.io
- In Backend, select
logpoint. - In Pipeline, choose the Logpoint pipeline that matches your data source:
logpoint_windowslogpoint_azurelogpoint_o365
- (Optional) Add
logpoint_defer_containsin addition to one of the pipelines above to defer Sigmacontainsinto an eval expression. This can help reduce wildcard-heavy searches that may lead to timeouts. - Paste your Sigma rule into the editor (e.g.,
rule.yml). - The converted Logpoint query will appear in the output panel—copy it as needed.
- To use Sigma CLI (the Sigma Rule Converter) and its underlying library, ensure you have Python version 3.10 or higher installed.
- Install dependent pysigma.
pip3 install pysigma- Install sigma-cli, command line tool for sigma rule conversion
pip3 install sigma-cli- After installing Sigma CLI, you need to add the Logpoint backend plugin. Choose one of the following methods:
sigma plugin install logpointOR
pip3 install pysigma-backend-logpointOnce the packages are successfully installed, you can convert Sigma rules into Logpoint queries using the command below. For example, to convert the Suspicious Process Masquerading As SvcHost.EXE
sigma convert -t logpoint -p logpoint_windows rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.ymlOutput
╭─ubuntu@ubuntu
╰─$ sigma convert -t logpoint -p logpoint_windows rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml
Parsing Sigma rules [####################################] 100%
label="Create" label="Process" "process"="*\svchost.exe" - ("process" IN ["C:\Windows\System32\svchost.exe", "C:\Windows\SysWOW64\svchost.exe"] OR file="svchost.exe")This backend is in its preliminary stage, which means there may be issues with query conversion from uncommon log types and it does not yet support conversion from all log sources covered by Sigma. Attempting to convert such rule types may result in an error.
This backend is currently maintained by Logpoint, with contributions from the following individuals:
If you encounter any issues, please don't hesitate to open a new issue.