Boost Your SIEM with High-Quality Threat Detection Rules

Supercharge your Elastic Security capabilities with this comprehensive bundle of 1165 Sigma rules,
expertly converted for immediate use in your SIEM. Derived from the industry-standard SigmaHQ repository,
these Cybersecurity Rules provide robust coverage against a wide range of TTPs (Tactics, Techniques, and Procedures).

Designed for SOC analysts and threat hunters, this package helps you detect advanced threats, including Windows Security anomalies,
suspicious Process Creation, and potential Malware Detection events. The rules are provided as an
Importable NDJSON file, ready to be uploaded directly as Kibana Saved Objects.

Compatibility & Requirements

  • Platform: Elastic Stack (ELK) & Elastic Security
  • Versions: Compatible with Elastic Stack 8.x (8.0 – 8.17+) and Serverless
  • Format: Kibana Saved Objects (NDJSON)
  • Schema: Mapped to ECS (Elastic Common Schema)

Top MITRE ATT&CK Tactics Covered

This bundle offers significant depth across the MITRE ATT&CK framework. Key tactics covered include:

  • Defense Evasion: 600 rules
  • Execution: 329 rules
  • Privilege Escalation: 169 rules
  • Persistence: 150 rules
  • Credential Access: 111 rules

Installation Instructions

  1. Download the .zip file and extract the .ndjson file.
  2. Open Kibana and navigate to Stack Management > Saved Objects.
  3. Click Import and select the extracted NDJSON file.
  4. Ensure “Check for existing objects” is selected to avoid duplicates.
  5. Once imported, the rules will appear in the Security > Rules section, ready to be enabled.

Updated on February 15, 2026. Source: SigmaHQ.

Tested versions
ECS compliant

You must log in to submit a review.

Related downloads

Elastic Cloud Monitoring dashboard

Kibana dashboard that uses the Elastic Cloud monitoring data to provide better insights into what’s happening in your cloud environment.

Move to next ILM phase Watcher

This watcher job is moving specific indices based on e.g. disc usage into the next ILM phase.

ACSC Advisory IOCs detection rules

ACSC Advisory IOCs detection rules for Elastic SIEM

Office display canvas example

Kibana canvas example showing an office screen with weather, news and stock information

UberAgent Monitoring Suite

Comprehensive dashboard suite for UberAgent data in Kibana/OpenSearch.

Ingest Pipeline Monitoring

This Kibana dashboard can be used monitor your ingest pipelines

These downloads could be also interesting for you

Watch for changes in IOWaits

A watch which alerts if the time spent by a hosts CPU in IOWait, has increased by more than than N% in the last Y mins.

Logstash REST to exec scripts

Make Logstash a REST endpoint that executes scripts or manually adds data in Elasticsearch.

Squid Proxy Access Logs Dashboard

Analyze Squid Proxy access logs ingested via Filebeat.

UberAgent Monitoring Suite

Comprehensive dashboard suite for UberAgent data in Kibana/OpenSearch.

Watch to detect large shards

This watch is getting data from the Elasticsearch shards API directly and checking for large shards.

Spring Boot Micrometer Dashboard

Monitor Spring Boot applications using Micrometer metrics.