Boost Your SIEM with High-Quality Threat Detection Rules

Supercharge your Elastic Security capabilities with this comprehensive bundle of 1165 Sigma rules,
expertly converted for immediate use in your SIEM. Derived from the industry-standard SigmaHQ repository,
these Cybersecurity Rules provide robust coverage against a wide range of TTPs (Tactics, Techniques, and Procedures).

Designed for SOC analysts and threat hunters, this package helps you detect advanced threats, including Windows Security anomalies,
suspicious Process Creation, and potential Malware Detection events. The rules are provided as an
Importable NDJSON file, ready to be uploaded directly as Kibana Saved Objects.

Compatibility & Requirements

  • Platform: Elastic Stack (ELK) & Elastic Security
  • Versions: Compatible with Elastic Stack 8.x (8.0 – 8.17+) and Serverless
  • Format: Kibana Saved Objects (NDJSON)
  • Schema: Mapped to ECS (Elastic Common Schema)

Top MITRE ATT&CK Tactics Covered

This bundle offers significant depth across the MITRE ATT&CK framework. Key tactics covered include:

  • Defense Evasion: 600 rules
  • Execution: 329 rules
  • Privilege Escalation: 169 rules
  • Persistence: 150 rules
  • Credential Access: 111 rules

Installation Instructions

  1. Download the .zip file and extract the .ndjson file.
  2. Open Kibana and navigate to Stack Management > Saved Objects.
  3. Click Import and select the extracted NDJSON file.
  4. Ensure “Check for existing objects” is selected to avoid duplicates.
  5. Once imported, the rules will appear in the Security > Rules section, ready to be enabled.

Updated on February 15, 2026. Source: SigmaHQ.

Tested versions
ECS compliant

You must log in to submit a review.

Related downloads

Sigma Sysmon detection rules

A collection of rules based on the Sigma detection rules for Windows Sysmon events based on Winlogbeat data.

Cloudflare Kibana dashboards

Cloudflare dashboards and ingest pipelines to visualize cloudflare logs

OpenSIEM Logstash Parsing

Logstash Parsing Configurations for Elastic SIEM parses many different sources into ECS

Vega Scatterplot Kibana visualization

A scatterplot visualization made with Vega Lite for Kibana

Vega Compound Gauge

This is a compund gauge visualization made with Vega. Its very helpful for visualization of percentage values.

These downloads could be also interesting for you

Plex ingest node pipeline

A plex ingest node pipeline to parse logs from Plex for Elasticsearch

Squid Proxy Access Logs Dashboard

Analyze Squid Proxy access logs ingested via Filebeat.

Uptime watch using Heartbeat data

This watch checks the availability of your Heartbeat observed services. It will trigger an alert whenever at least one of your services is down.

Postfix Mail Server Dashboard

Monitor Postfix mail server logs with Kibana.

Impossible travel transform job

Impossible travel detection by calculating the distance between two login locations in combination with the time between the two logins

Elastic Stack Monitoring Dashboard

Kibana dashboards that is showing the monitoring data collected by Elastics in built monitoring capabilities.