The following document defines the standardized tags that can be used to categorize the different Sigma rules.
Tactics:
Use the CAR tag from MITRE analytics repository without the prepending CAR-
. Example
tag: car.2016-04-005
.
Use the CVE tag from MITRE in lower case separated by dots. Example tag: cve.2021-44228
.
D3FEND is a knowledge base, and more specifically a knowledge graph, of cybersecurity countermeasure techniques. It is a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques.
For example:
d3fend.d3-am
: Access Modelingd3fend.d3f-WindowsNtOpenFile
: Windows NtOpenFileTactics:
Use the detection tag to indicate the type of a rule. Example tag: detection.threat-hunting
.
The following tags are currently supported:
detection.dfir
detection.emerging-threats
detection.threat-hunting
The Summiting the Pyramid scheme created by MITRE defines two score dimensions for scoring of the robustness:
Details for both dimensions are defined here.
The stp namespace allows to score the robustness of the detection implemented by a Sigma rule according to this scheme. Because the event robustness depends on the event log source that is an environmental property, Sigma allows to specify the robustness in the following ways:
stp.4
. This is usually appropriate for generic
log sources like process_creation where it isn’t possible to anticipate the robustness of the final log source.stp.3k
. Such a tag should be chosen if the detection refers to a
concrete log source.All TLP levels defined by the FIRST TLP-SIG in lower case. Example tag: tlp.amber
.
The following tags are currently supported:
tlp.red
tlp.amber
tlp.amber-strict
tlp.green
tlp.clear