Threat Intelligence Tagging Taxonomy
Overview
All threat indicators are tagged using a structured taxonomy with namespace prefixes. This enables precise filtering, correlation, and behavioral analysis.
Behavioral Tags
Describes what the observable does or is used for.
behavior: namespace
behavior:c2- Command & Control infrastructurebehavior:phishing- Phishing/credential theftbehavior:malware-distribution- Malware hosting/distributionbehavior:scanning- Network scanning/reconnaissancebehavior:brute-force- Credential brute-force attacksbehavior:ddos- DDoS infrastructure/participationbehavior:spam- Spam/email abusebehavior:cryptomining- Cryptocurrency miningbehavior:exfiltration- Data exfiltrationbehavior:ransomware- Ransomware operationbehavior:botnet- Botnet participationbehavior:exploit- Exploitation activity
Example:
"tags": ["behavior:c2", "behavior:post-exploitation"]Infrastructure Tags
Describes the technical environment or service type.
infrastructure: namespace
infrastructure:cloud-aws- Amazon Web Servicesinfrastructure:cloud-gcp- Google Cloud Platforminfrastructure:cloud-azure- Microsoft Azureinfrastructure:cloud-cloudflare- Cloudflare CDNinfrastructure:tor-exit- TOR exit nodeinfrastructure:tor-relay- TOR relay nodeinfrastructure:vpn- VPN endpointinfrastructure:proxy-http- HTTP proxyinfrastructure:datacenter- Datacenter/colocation hostinginfrastructure:residential- Residential ISPinfrastructure:mobile- Mobile carrier
Malware Family Tags
Specific malware family or tool identification.
malware_family: namespace
malware_family:cobalt-strikemalware_family:metasploitmalware_family:asyncratmalware_family:emotetmalware_family:miraimalware_family:xmrig
Format rules: Lowercase with hyphens, official malware name preferred
Threat Actor Tags
Attribution to threat actors or groups (when confidence is high).
threat_actor: namespace
threat_actor:apt28threat_actor:apt29threat_actor:lazarus-groupthreat_actor:sandworm
MITRE ATT&CK Tags
Maps to MITRE ATT&CK framework techniques.
technique: namespace
technique:T1566- Phishingtechnique:T1566.001- Spearphishing Attachmenttechnique:T1071- Application Layer Protocoltechnique:T1071.001- Web Protocolstechnique:T1105- Ingress Tool Transfer
Format: technique:T#### or technique:T####.### for sub-techniques
Severity & Confidence Tags
severity: namespace
severity:critical- Immediate action requiredseverity:high- High priorityseverity:medium- Medium priorityseverity:low- Low priority
confidence: namespace
confidence:high- 0.8-1.0 (highly reliable)confidence:medium- 0.5-0.79 (generally reliable)confidence:low- 0.0-0.49 (uncertain)
Tag Combination Examples
Valid Combinations
["behavior:c2", "malware_family:cobalt-strike", "severity:critical"]
["infrastructure:tor-exit", "infrastructure:datacenter"]
["behavior:phishing", "technique:T1566", "confidence:high"]