Pre-compiled Sigma rules converted to Zircolite JSON format, updated daily.
This repository automatically converts the SigmaHQ detection rules into JSON rulesets compatible with Zircolite, a standalone SIGMA-based detection tool for EVTX, Auditd, and Sysmon for Linux logs.
The repository provides two ruleset types, each filtered by severity level:
For use with Sysmon event logs:
| File | Description |
|---|---|
rules_windows_sysmon.json |
All severity levels |
rules_windows_sysmon_medium.json |
Medium, High, and Critical only |
rules_windows_sysmon_high.json |
High and Critical only |
For use with standard Windows event logs:
| File | Description |
|---|---|
rules_windows_generic.json |
All severity levels |
rules_windows_generic_medium.json |
Medium, High, and Critical only |
rules_windows_generic_high.json |
High and Critical only |
Download the ruleset you need and use it with Zircolite:
# Using Sysmon rules
python3 zircolite.py --evtx logs/ --ruleset rules_windows_sysmon.json
# Using generic Windows rules (high severity only)
python3 zircolite.py --evtx logs/ --ruleset rules_windows_generic_high.jsonYou can download the latest rulesets directly:
# Sysmon rulesets
curl -O https://raw.githubusercontent.com/wagga40/Zircolite-Rules/main/rules_windows_sysmon.json
curl -O https://raw.githubusercontent.com/wagga40/Zircolite-Rules/main/rules_windows_sysmon_medium.json
curl -O https://raw.githubusercontent.com/wagga40/Zircolite-Rules/main/rules_windows_sysmon_high.json
# Generic rulesets
curl -O https://raw.githubusercontent.com/wagga40/Zircolite-Rules/main/rules_windows_generic.json
curl -O https://raw.githubusercontent.com/wagga40/Zircolite-Rules/main/rules_windows_generic_medium.json
curl -O https://raw.githubusercontent.com/wagga40/Zircolite-Rules/main/rules_windows_generic_high.json- Sigma Rules: The official SigmaHQ rules repository is included as a Git submodule
- pySigma Backend: Uses pySigma-backend-sqlite to convert Sigma YAML rules to Zircolite's JSON format
- Pipelines: Applies appropriate field mappings via pySigma pipelines:
- Sysmon:
sysmon_pipeline+windows_logsource_pipeline - Generic:
windows_audit_pipeline+windows_logsource_pipeline
- Sysmon:
- Filtering: Rules are sorted and filtered by severity level (informational, low, medium, high, critical)
A GitHub Actions workflow runs daily at 1:00 AM UTC to:
- Pull the latest Sigma rules from SigmaHQ
- Convert all Windows rules to Zircolite format
- Commit and push updated rulesets
Each ruleset generation produces a detailed log file (*_conversion.log) containing:
- Total rules processed
- Success/failure counts and rates
- List of failed rules with error messages
- List of successfully converted rules
- Zircolite - SIGMA-based detection tool
- Sigma - Generic signature format for SIEM systems
- pySigma - Python library for Sigma rule handling
MIT License - See LICENSE for details.