A standalone Python tool for applying SIGMA detection rules to EVTX, Auditd, Sysmon for Linux, and other log formats.
Zircolite is a standalone Python tool that applies SIGMA detection rules to various log formats, including Windows EVTX, Linux Auditd, and Sysmon for Linux logs. It enables security professionals to perform threat hunting and log analysis by converting SIGMA rules into queries that run against log data, identifying potential security incidents.
Security analysts, incident responders, threat hunters, and blue team members who need to analyze logs for malicious activity using the SIGMA rule standard.
Developers choose Zircolite for its portability, native SIGMA support, and ability to handle multiple log formats without external dependencies. Its automatic log detection, field transformation capabilities, and rich output make it a versatile tool for on-the-fly or batch log analysis.
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Uses magic bytes, content analysis, and regex fallback to identify log formats and timestamp fields automatically, minimizing manual configuration as described in the Key Features section.
Directly processes Sigma YAML rules with the pySigma backend, avoiding proprietary conversions and enabling use of standard detection rules without extra steps, as highlighted in the Native Sigma Support.
Supports custom Python transforms like Base64 decoding and hex-to-ASCII conversion for enriching log data, allowing analysts to decode obfuscated commands or extract IOCs, detailed in the Field Transforms examples.
Exports results to multiple formats including JSON, CSV, Splunk, and Elasticsearch using Jinja templates, providing seamless integration with various SIEMs and analysis tools.
On some systems like Mac or ARM, the evtx library requires Rust and Cargo to be installed, adding setup overhead beyond standard Python dependencies, as noted in the Requirements section.
The provided rulesets are acknowledged to be noisy and slow, forcing users to build and maintain custom rulesets for effective detection, which requires additional effort and expertise.
Primarily designed for batch analysis of log files, lacking built-in support for real-time log streaming or continuous monitoring, limiting use in dynamic environments.