Boost Your SIEM with High-Quality Threat Detection Rules

Supercharge your Elastic Security capabilities with this comprehensive bundle of 1165 Sigma rules,
expertly converted for immediate use in your SIEM. Derived from the industry-standard SigmaHQ repository,
these Cybersecurity Rules provide robust coverage against a wide range of TTPs (Tactics, Techniques, and Procedures).

Designed for SOC analysts and threat hunters, this package helps you detect advanced threats, including Windows Security anomalies,
suspicious Process Creation, and potential Malware Detection events. The rules are provided as an
Importable NDJSON file, ready to be uploaded directly as Kibana Saved Objects.

Compatibility & Requirements

  • Platform: Elastic Stack (ELK) & Elastic Security
  • Versions: Compatible with Elastic Stack 8.x (8.0 – 8.17+) and Serverless
  • Format: Kibana Saved Objects (NDJSON)
  • Schema: Mapped to ECS (Elastic Common Schema)

Top MITRE ATT&CK Tactics Covered

This bundle offers significant depth across the MITRE ATT&CK framework. Key tactics covered include:

  • Defense Evasion: 600 rules
  • Execution: 329 rules
  • Privilege Escalation: 169 rules
  • Persistence: 150 rules
  • Credential Access: 111 rules

Installation Instructions

  1. Download the .zip file and extract the .ndjson file.
  2. Open Kibana and navigate to Stack Management > Saved Objects.
  3. Click Import and select the extracted NDJSON file.
  4. Ensure “Check for existing objects” is selected to avoid duplicates.
  5. Once imported, the rules will appear in the Security > Rules section, ready to be enabled.

Updated on February 15, 2026. Source: SigmaHQ.

Tested versions
ECS compliant

You must log in to submit a review.

Related downloads

Kibana Enhanced Table plugin

Data Table visualization with enhanced features like computed columns, pivot table or filter bar

Watch to detect large shards

This watch is getting data from the Elasticsearch shards API directly and checking for large shards.

Microsoft 365 Dashboards for Elastic

Visualize your Microsoft 365 data in Kibana.

Threat detection Kibana dashboard

Kibana dashboard example visualizing the results of the Elastic SIEM detection engine

AWS Cloudtrail Monitoring dashboard

Deep insights into AWS Cloudtrail events for SIEM and Monitoring

Elastic Cloud Billing data collection and Kibana dashboard

Pulls Elastic Cloud Billing information from the Billing API then sends it to an Elasticsearch cluster and visualizes the results in Kibana dashboards.

These downloads could be also interesting for you

Elasticsearch Performance Troubleshooting Kit

Download the Elasticsearch Performance Troubleshooting Kit to efficiently diagnose and resolve slow query issues in your Elasticsearch environment.

Spring Boot Micrometer Dashboard

Monitor Spring Boot applications using Micrometer metrics.

Google Cloud monitoring dashboard

Dashboard to monitor GCP resources using different metrics and logs.

Kubernetes architecture overview

Vega visualization to show the dependencies between the different Kubernetes components in a single visualization

Sigma detection rules for proxy server logs

A collection of rules based on the Sigma detection rules for proxy server and web server looks, e.g. zeek or suricata.

Vega Clock UTC

This is a working clock visualization in UTC time.