Skip to Content
ReferenceSIEM Backends

SIEM Backends

CloudSigma converts Sigma rules to native query formats for 6 SIEM platforms using pySigma  backends.

Supported Backends

Splunk

PropertyValue
Backend IDsplunk
Output formatSPL (Search Processing Language)
pySigma backendpySigma-backend-splunk

Example output:

index=cloudtrail eventName="CreateAccessKey" | table _time eventName sourceIPAddress userIdentity.arn

Microsoft Sentinel

PropertyValue
Backend IDsentinel
Output formatKQL (Kusto Query Language)
pySigma backendpySigma-backend-microsoft365defender

Example output:

CloudTrailLogs | where EventName == "CreateAccessKey" | project TimeGenerated, EventName, SourceIpAddress, UserIdentityArn

Elasticsearch

PropertyValue
Backend IDelasticsearch
Output formatLucene query syntax
pySigma backendpySigma-backend-elasticsearch

Example output:

eventName:"CreateAccessKey"

Google Chronicle

PropertyValue
Backend IDchronicle
Output formatUDM Search queries
pySigma backendpySigma-backend-chronicle

Example output:

metadata.event_type = "USER_RESOURCE_ACCESS" AND target.resource.name = "CreateAccessKey"

OpenSearch

PropertyValue
Backend IDopensearch
Output formatLucene / DQL query syntax
pySigma backendpySigma-backend-opensearch

Example output:

eventName:"CreateAccessKey"

Google SecOps

PropertyValue
Backend IDgoogle_secops
Output formatYARA-L rules
pySigma backendpySigma-backend-google-secops

Example output:

rule aws_iam_access_key_creation { meta: author = "CloudSigma" events: $e.metadata.event_type = "USER_RESOURCE_ACCESS" $e.target.resource.name = "CreateAccessKey" condition: $e }

Specifying Backends

Pass backend IDs in the targetSiems option when calling POST /v1/generate:

curl -X POST https://cloudsigma.a13e.com/v1/generate \ -H "Authorization: Bearer YOUR_API_KEY" \ -H "Content-Type: application/json" \ -d '{ "inputType": "url", "url": "https://example.com/advisory", "options": { "targetSiems": ["splunk", "sentinel", "chronicle"] } }'

Omit targetSiems to convert to all 6 backends.

Conversion in Response

Converted queries appear in each rule’s conversions object:

{ "rules": [ { "yaml": "title: AWS IAM Access Key Creation...", "title": "AWS IAM Access Key Creation", "conversions": { "splunk": "index=cloudtrail eventName=\"CreateAccessKey\"", "sentinel": "CloudTrailLogs | where EventName == \"CreateAccessKey\"" } } ] }

Only the requested backends appear in conversions.

Backend Compatibility

Not all Sigma features are supported equally across backends. pySigma handles translation differences automatically, but some complex detection logic may produce simpler queries in certain backends.

FeatureSplunkSentinelElasticsearchChronicleOpenSearchGoogle SecOps
Wildcard matchingYesYesYesYesYesYes
Regex matchingYesYesYesYesYesYes
Near/proximityYesNoNoNoNoNo
AggregationYesYesPartialPartialPartialYes
Last updated on