Boost Your SIEM with High-Quality Threat Detection Rules

Supercharge your Elastic Security capabilities with this comprehensive bundle of 1165 Sigma rules,
expertly converted for immediate use in your SIEM. Derived from the industry-standard SigmaHQ repository,
these Cybersecurity Rules provide robust coverage against a wide range of TTPs (Tactics, Techniques, and Procedures).

Designed for SOC analysts and threat hunters, this package helps you detect advanced threats, including Windows Security anomalies,
suspicious Process Creation, and potential Malware Detection events. The rules are provided as an
Importable NDJSON file, ready to be uploaded directly as Kibana Saved Objects.

Compatibility & Requirements

  • Platform: Elastic Stack (ELK) & Elastic Security
  • Versions: Compatible with Elastic Stack 8.x (8.0 – 8.17+) and Serverless
  • Format: Kibana Saved Objects (NDJSON)
  • Schema: Mapped to ECS (Elastic Common Schema)

Top MITRE ATT&CK Tactics Covered

This bundle offers significant depth across the MITRE ATT&CK framework. Key tactics covered include:

  • Defense Evasion: 600 rules
  • Execution: 329 rules
  • Privilege Escalation: 169 rules
  • Persistence: 150 rules
  • Credential Access: 111 rules

Installation Instructions

  1. Download the .zip file and extract the .ndjson file.
  2. Open Kibana and navigate to Stack Management > Saved Objects.
  3. Click Import and select the extracted NDJSON file.
  4. Ensure “Check for existing objects” is selected to avoid duplicates.
  5. Once imported, the rules will appear in the Security > Rules section, ready to be enabled.

Updated on February 15, 2026. Source: SigmaHQ.

Tested versions
ECS compliant

You must log in to submit a review.

Related downloads

Data flow canvas

Average rating:

This canvas examples shows some possibilities of how to visualize data flows. Every flow can be activated / deactivated based on your Elasticsearch data.

Office display canvas example

Kibana canvas example showing an office screen with weather, news and stock information

Observability Kibana Dashboard

A single pane of glass dashboard for Logs, Metrics, APM data and business KPIs.

Sigma Zeek Detection rules

A collection of rules based on the Sigma rules for Zeek based on the Filebeat Zeek module.

RUM extension dashboard

This dashboard provide deeper insight into the real user monitoring data collected by Elastic RUM.

Kibana Maps with Open Weather Map

This is the default basemap of Kibana incl. the Open Weather Map tile for temperature, wind and pressure

These downloads could be also interesting for you

Resource Optimization Dashboard

Elastic Resource Optimization Dashboard to seamlessly integrate APM insights with cloud cost data for actionable resource management and cost-saving strategies

Filebeat Log analysis canvas example

This is a simple canvas dashboard example that analyzes logs created by Filebeat.

OpenSIEM Logstash Parsing

Logstash Parsing Configurations for Elastic SIEM parses many different sources into ECS

Kibana Enhanced Table plugin

Data Table visualization with enhanced features like computed columns, pivot table or filter bar

Azure billing data network

A vega visualization that shows the connection between resource group, resource type and the resource itself based on Elastic agent azure billing data integration.

Sigma Elastic SIEM rules for web server logs

A collection of rules based on the Sigma detection rules for web server looks, e.g. apache, nginx or IIS.