I recently disassembled dwarfort.exe, and made an interesting discovery. I don't know assembly from a hole in the ground, but I found a part that seemed to have something to do with the tags.
code:
0048577C B990F58900 mov ecx, 0089F590
(StringData)"REMAINS_COLOR"
:00485781 8D7C2438 lea edi, dword[esp+38]
:00485785 E85622F9FF call 004179E0
:0048578A 85C0 test eax, eax
:0048578C 0F85A6000000 jne 00485838
:00485792 8D8C248C000000 lea ecx, dword[esp+0000008C]
:00485799 E8B20BF8FF call 00406350
:0048579E 8D4C2470 lea ecx, dword[esp+70]
:004857A2 E8A90BF8FF call 00406350
:004857A7 8D4C2454 lea ecx, dword[esp+54]
:004857AB E8A00BF8FF call 00406350
:004857B0 8B5C241C mov ebx, dword[esp+1C]
:004857B4 53 push ebx
:004857B5 8D74241C lea esi, dword[esp+1C]
:004857B9 8DBC2490000000 lea edi, dword[esp+00000090]
:004857C0 C684246001000046 mov byte[esp+00000160], 46
:004857C8 E8C3572600 call 006EAF90
:004857CD 83C404 add esp, 004
:004857D0 84C0 test al, al
:004857D2 0F8471FEFFFF je 00485649
:004857D8 53 push ebx
:004857D9 8D7C2474 lea edi, dword[esp+74]
:004857DD E8AE572600 call 006EAF90
:004857E2 83C404 add esp, 004
:004857E5 84C0 test al, al
:004857E7 0F845CFEFFFF je 00485649
:004857ED 53 push ebx
:004857EE 8D7C2458 lea edi, dword[esp+58]
:004857F2 E899572600 call 006EAF90
:004857F7 83C404 add esp, 004
:004857FA 84C0 test al, al
:004857FC 0F8447FEFFFF je 00485649
:00485802 8D84248C000000 lea eax, dword[esp+0000008C]
:00485809 E892C5F8FF call 00411DA0
:0048580E 6689852C050000 mov word[ebp+0000052C], ax
:00485815 8D442470 lea eax, dword[esp+70]
:00485819 E882C5F8FF call 00411DA0
:0048581E 6689852E050000 mov word[ebp+0000052E], ax
:00485825 8BC7 mov eax, edi
:00485827 E874C5F8FF call 00411DA0
:0048582C 66898530050000 mov word[ebp+00000530], ax
:00485833 E911FEFFFF jmp 00485649
---------
:00485838 B9A0F58900 mov ecx, 0089F5A0
(StringData)"IMMOBILE_LAND"
:0048583D 8D7C2438 lea edi, dword[esp+38]
:00485841 E89A21F9FF call 004179E0
:00485846 85C0 test eax, eax
:00485848 7513 jne 0048585D
:0048584A 8DB5AC060000 lea esi, dword[ebp+000006AC]
:00485850 8D4827 lea ecx, dword[eax+27]
:00485853 E85841F8FF call 004099B0
:00485858 E97AC9FFFF jmp 004821D7
---------
:0048585D B9B0F58900 mov ecx, 0089F5B0
(StringData)"VERMIN_EATER"
:00485862 8D7C2438 lea edi, dword[esp+38]
:00485866 E87521F9FF call 004179E0
:0048586B 85C0 test eax, eax
:0048586D 751D jne 0048588C
:0048586F 8DB5AC060000 lea esi, dword[ebp+000006AC]
:00485875 8D480C lea ecx, dword[eax+0C]
:00485878 E83341F8FF call 004099B0
:0048587D C7856805000001000000 mov dword[ebp+00000568], 00000001
:00485887 E94BC9FFFF jmp 004821D7
---------
:0048588C B9C0F58900 mov ecx, 0089F5C0
(StringData)"LIGHT_GEN"
:00485891 8D7C2438 lea edi, dword[esp+38]
:00485895 E84621F9FF call 004179E0
:0048589A 85C0 test eax, eax
:0048589C 7515 jne 004858B3
:0048589E 8DB5AC060000 lea esi, dword[ebp+000006AC]
:004858A4 B987000000 mov ecx, 00000087
:004858A9 E80241F8FF call 004099B0
:004858AE E924C9FFFF jmp 004821D7
---------
:004858B3 B9CCF58900 mov ecx, 0089F5CC
(StringData)"VERMIN_GROUNDER"
:004858B8 8D7C2438 lea edi, dword[esp+38]
:004858BC E81F21F9FF call 004179E0
:004858C1 85C0 test eax, eax
:004858C3 751D jne 004858E2
:004858C5 8DB5AC060000 lea esi, dword[ebp+000006AC]
:004858CB 8D480D lea ecx, dword[eax+0D]
:004858CE E8DD40F8FF call 004099B0
:004858D3 C7856805000001000000 mov dword[ebp+00000568], 00000001
:004858DD E9F5C8FFFF jmp 004821D7
---------