mirror of https://github.com/MISP/misp-objects
Add and enforce UUID in the object definitions
parent
c0bd545347
commit
2c2c11c9ca
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "ddos",
|
"name": "ddos",
|
||||||
|
"uuid": "e2f124d6-f57c-4f93-99e6-8450545fa05d",
|
||||||
"meta-category": "network",
|
"meta-category": "network",
|
||||||
"description": "DDoS object describes a current DDoS activity from a specific or/and to a specific target. Type of DDoS can be attached to the object as a taxonomy",
|
"description": "DDoS object describes a current DDoS activity from a specific or/and to a specific target. Type of DDoS can be attached to the object as a taxonomy",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "domain|ip",
|
"name": "domain|ip",
|
||||||
|
"uuid": "43b3b146-77eb-4931-b4cc-b66c60f28734",
|
||||||
"meta-category": "network",
|
"meta-category": "network",
|
||||||
"description": "A domain and IP address seen as a tuple in a specific time frame.",
|
"description": "A domain and IP address seen as a tuple in a specific time frame.",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "elf-section",
|
"name": "elf-section",
|
||||||
|
"uuid": "ca271f32-1234-4e87-b240-6b6e882de5de",
|
||||||
"meta-category": "file",
|
"meta-category": "file",
|
||||||
"description": "Object describing a section of an Executable and Linkable Format",
|
"description": "Object describing a section of an Executable and Linkable Format",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "elf",
|
"name": "elf",
|
||||||
|
"uuid": "fa6534ae-ad74-4ce0-8f23-15a66c82c7fa",
|
||||||
"meta-category": "file",
|
"meta-category": "file",
|
||||||
"description": "Object describing a Executable and Linkable Format",
|
"description": "Object describing a Executable and Linkable Format",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "email",
|
"name": "email",
|
||||||
|
"uuid": "a0c666e0-fc65-4be8-b48f-3423d788b552",
|
||||||
"meta-category": "email",
|
"meta-category": "email",
|
||||||
"description": "Email object describing an email with meta-information",
|
"description": "Email object describing an email with meta-information",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "file",
|
"name": "file",
|
||||||
|
"uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
||||||
"meta-category": "file",
|
"meta-category": "file",
|
||||||
"description": "File object describing a file with meta-information",
|
"description": "File object describing a file with meta-information",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
@ -83,8 +84,8 @@
|
||||||
"disable_correlation": true
|
"disable_correlation": true
|
||||||
},
|
},
|
||||||
"malware-sample": {
|
"malware-sample": {
|
||||||
"misp-attribute": "malware-sample",
|
"misp-attribute": "malware-sample",
|
||||||
"misp-usage-frequency": 1
|
"misp-usage-frequency": 1
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"requiredOneOf": [
|
"requiredOneOf": [
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "ip|port",
|
"name": "ip|port",
|
||||||
|
"uuid": "9f8cea74-16fe-4968-a2b4-026676949ac6",
|
||||||
"meta-category": "network",
|
"meta-category": "network",
|
||||||
"description": "An IP address and a port seen as a tuple (or as a triple) in a specific time frame.",
|
"description": "An IP address and a port seen as a tuple (or as a triple) in a specific time frame.",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "passive-dns",
|
"name": "passive-dns",
|
||||||
|
"uuid": "b77b7b1c-66ab-4a41-8da4-83810f6d2d6c",
|
||||||
"meta-category": "network",
|
"meta-category": "network",
|
||||||
"description": "Passive DNS records as expressed in draft-dulaunoy-dnsop-passive-dns-cof-01",
|
"description": "Passive DNS records as expressed in draft-dulaunoy-dnsop-passive-dns-cof-01",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "pe-section",
|
"name": "pe-section",
|
||||||
|
"uuid": "198a17d2-a135-4b25-9a32-5aa4e632014a",
|
||||||
"meta-category": "file",
|
"meta-category": "file",
|
||||||
"description": "Object describing a section of a Portable Executable",
|
"description": "Object describing a section of a Portable Executable",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "pe",
|
"name": "pe",
|
||||||
|
"uuid": "cf7adecc-d4f0-4e88-9d90-f978ee151a07",
|
||||||
"meta-category": "file",
|
"meta-category": "file",
|
||||||
"description": "Object describing a Portable Executable",
|
"description": "Object describing a Portable Executable",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "registry-key",
|
"name": "registry-key",
|
||||||
|
"uuid": "8b3228ad-6d82-4fe6-b2ae-05426308f1d5",
|
||||||
"meta-category": "file",
|
"meta-category": "file",
|
||||||
"description": "Registry key object describing a Windows registry key with value and last-modified timestamp",
|
"description": "Registry key object describing a Windows registry key with value and last-modified timestamp",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "url",
|
"name": "url",
|
||||||
|
"uuid": "60efb77b-40b5-4c46-871b-ed1ed999fce5",
|
||||||
"meta-category": "network",
|
"meta-category": "network",
|
||||||
"description": "url object describes an url along with its normalized field (like extracted using faup parsing library) and its metadata.",
|
"description": "url object describes an url along with its normalized field (like extracted using faup parsing library) and its metadata.",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "vulnerability",
|
"name": "vulnerability",
|
||||||
|
"uuid": "81650945-f186-437b-8945-9f31715d32da",
|
||||||
"meta-category": "network",
|
"meta-category": "network",
|
||||||
"description": "Vulnerability object describing common vulnerability enumeration",
|
"description": "Vulnerability object describing common vulnerability enumeration",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "whois",
|
"name": "whois",
|
||||||
|
"uuid": "429faea1-34ff-47af-8a00-7c62d3be5a6a",
|
||||||
"meta-category": "network",
|
"meta-category": "network",
|
||||||
"description": "Whois records information for a domain name.",
|
"description": "Whois records information for a domain name.",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "x509",
|
"name": "x509",
|
||||||
|
"uuid": "d1ab756a-26b5-4349-9f43-765630f0911c",
|
||||||
"meta-category": "network",
|
"meta-category": "network",
|
||||||
"description": "x509 object describing a X.509 certificate",
|
"description": "x509 object describing a X.509 certificate",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
|
|
|
@ -40,6 +40,9 @@
|
||||||
"disable_correlation": {
|
"disable_correlation": {
|
||||||
"type": "boolean"
|
"type": "boolean"
|
||||||
},
|
},
|
||||||
|
"to_ids": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"type": "string"
|
"type": "string"
|
||||||
}
|
}
|
||||||
|
@ -65,6 +68,9 @@
|
||||||
"version": {
|
"version": {
|
||||||
"type": "integer"
|
"type": "integer"
|
||||||
},
|
},
|
||||||
|
"uuid": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
"attributes": {
|
"attributes": {
|
||||||
"type": "object",
|
"type": "object",
|
||||||
"additionalProperties": {
|
"additionalProperties": {
|
||||||
|
@ -92,6 +98,7 @@
|
||||||
"version",
|
"version",
|
||||||
"description",
|
"description",
|
||||||
"meta-category",
|
"meta-category",
|
||||||
"name"
|
"name",
|
||||||
|
"uuid"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,15 @@
|
||||||
|
#!/usr/bin/env python
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
from glob import glob
|
||||||
|
import json
|
||||||
|
|
||||||
|
all_uuids = {}
|
||||||
|
for definition in glob('./objects/*/definition.json'):
|
||||||
|
with open(definition, 'r') as f:
|
||||||
|
d = json.load(f)
|
||||||
|
uuid = d['uuid']
|
||||||
|
name = d['name']
|
||||||
|
if all_uuids.get(uuid):
|
||||||
|
raise Exception('Same uuid for {} and {} ({})'.format(name, all_uuids.get(uuid), uuid))
|
||||||
|
all_uuids[uuid] = name
|
|
@ -19,3 +19,4 @@ do
|
||||||
echo ''
|
echo ''
|
||||||
done
|
done
|
||||||
|
|
||||||
|
./unique_uuid.py
|
||||||
|
|
Loading…
Reference in New Issue