OpenCTI vs Sigma
GitHub Stats
About OpenCTI
OpenCTI is an open-source platform for managing cyber threat intelligence knowledge and observables. Built on a STIX2-native data model, it provides a unified view of threat data including threat actors, intrusion sets, campaigns, malware, vulnerabilities, and their relationships. OpenCTI uses a graph database (Neo4j or Amazon Neptune) to store and visualize complex relationships between entities, making it easy to understand how threat actors, TTPs, and infrastructure are connected. It supports connectors for automatic ingestion from MISP, AlienVault, VirusTotal, Shodan, and dozens of other sources. The platform includes role-based access control, workflow management for analyst collaboration, and export capabilities for integration with SIEMs and SOAR platforms.
About Sigma
Sigma is a generic and open signature format for SIEM systems, analogous to what YARA is for files and Snort is for network traffic. Sigma rules describe log events in a YAML-based format that is independent of any specific SIEM product. Using the sigma-cli converter (pySigma), rules can be translated into native query languages for Splunk (SPL), Elasticsearch (Lucene/KQL), Microsoft Sentinel, QRadar, CrowdStrike, Carbon Black, Grep, and over 30 other backends. The Sigma rule repository contains thousands of community-contributed detection rules covering MITRE ATT&CK techniques, common malware behaviors, lateral movement, persistence mechanisms, and suspicious system activity. Security teams use Sigma to write detection logic once and deploy it across their entire detection infrastructure, regardless of which SIEM products they use. The format is maintained by the SigmaHQ project and has become the de facto standard for shareable detection rules.
Platform Support
Tags
OpenCTI only
Sigma only