From 8b20e4d61938a5899b6382822f1b235137ec87e7 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Mon, 18 Nov 2024 10:41:29 +0100 Subject: [PATCH] chg: [vulnerability] sighting predicate added as described on https://vulnerability.circl.lu/ --- MANIFEST.json | 6 ++--- vulnerability/machinetag.json | 46 ++++++++++++++++++++++++++++++++++- 2 files changed, 48 insertions(+), 4 deletions(-) diff --git a/MANIFEST.json b/MANIFEST.json index 2426e10..ec90dc4 100644 --- a/MANIFEST.json +++ b/MANIFEST.json @@ -316,7 +316,7 @@ { "description": "Exercise is a taxonomy to describe if the information is part of one or more cyber or crisis exercise.", "name": "exercise", - "version": 11 + "version": 12 }, { "description": "Reasons why an event has been extended. This taxonomy must be used on the extended event. The competitive analysis aspect is from Psychology of Intelligence Analysis by Richard J. Heuer, Jr. ref:http://www.foo.be/docs/intelligence/PsychofIntelNew.pdf", @@ -761,7 +761,7 @@ { "description": "A taxonomy for describing vulnerabilities (software, hardware, or social) on different scales or with additional available information.", "name": "vulnerability", - "version": 1 + "version": 2 }, { "description": "Workflow support language is a common language to support intelligence analysts to perform their analysis on data and information.", @@ -770,5 +770,5 @@ } ], "url": "https://raw.githubusercontent.com/MISP/misp-taxonomies/main/", - "version": "20241111" + "version": "20241118" } diff --git a/vulnerability/machinetag.json b/vulnerability/machinetag.json index 8aa398d..11a5a76 100644 --- a/vulnerability/machinetag.json +++ b/vulnerability/machinetag.json @@ -2,7 +2,7 @@ "namespace": "vulnerability", "expanded": "vulnerability", "description": "A taxonomy for describing vulnerabilities (software, hardware, or social) on different scales or with additional available information.", - "version": 1, + "version": 2, "predicates": [ { "value": "exploitability", @@ -14,9 +14,53 @@ "value": "information", "expanded": "Information", "description": "Complementary information related to the vulnerability." + }, + { + "value": "Sighting", + "description": "Sighting information related to the vulnerability." } ], "values": [ + { + "predicate": "sighting", + "entry": [ + { + "value": "seen", + "expanded": "Seen", + "description": "The vulnerability was mentioned, discussed, or seen somewhere by the user." + }, + { + "value": "confirmed", + "expanded": "Confirmed", + "description": "The vulnerability is confirmed from an analyst perspective." + }, + { + "value": "exploited", + "expanded": "Exploited", + "description": "This vulnerability was exploited and seen by the user reporting the sighting." + }, + { + "value": "patched", + "expanded": "Patched", + "description": "This vulnerability was successfully patched by the user reporting the sighting." + }, + { + "value": "not-exploited", + "expanded": "Not exploited", + "description": "This vulnerability was not exploited or seen by the user reporting the sighting." + }, + { + "value": "not-confirmed", + "expanded": "Not confirmed", + "description": "The user expresses doubt about the veracity of the vulnerability." + }, + { + "value": "not-patched", + "expanded": "Not patched", + "description": "This vulnerability was not successfully patched by the user reporting the sighting." + } + ] + }, { "predicate": "exploitability", "entry": [