diff --git a/meteor/app/client/incidentsveris.js b/meteor/app/client/incidentsveris.js
index dd6183da..d797f552 100644
--- a/meteor/app/client/incidentsveris.js
+++ b/meteor/app/client/incidentsveris.js
@@ -13,7 +13,7 @@ if (Meteor.isClient) {
Template.incidentsveris.rendered = function () {
var ndx = crossfilter();
var container=document.getElementById('veris-wrapper')
- var margin = {top: 20, right: 20, bottom: 20, left: 20},
+ var margin = {top: 30, right: 20, bottom: 30, left: 20},
width = window.innerWidth - margin.left - margin.right,
height = window.innerHeight - margin.top - margin.bottom,
minRadius=3,
diff --git a/meteor/app/client/mozdef.js b/meteor/app/client/mozdef.js
index 41304daf..aa495ca4 100644
--- a/meteor/app/client/mozdef.js
+++ b/meteor/app/client/mozdef.js
@@ -12,7 +12,7 @@ Anthony Verez averez@mozilla.com
if (Meteor.isClient) {
//defaults:
Meteor.startup(function () {
- Session.set('verisfilter','');
+ Session.set('verisfilter',' ');
Session.set('alertssearchtext','');
Session.set('alertssearchtime','tail');
Session.set('alertsfiltertext','');
diff --git a/meteor/app/client/verisTags.html b/meteor/app/client/verisTags.html
index 74bf2d84..b9c7335e 100644
--- a/meteor/app/client/verisTags.html
+++ b/meteor/app/client/verisTags.html
@@ -49,8 +49,15 @@ li {
action
impact
discovery
- motive
confidence
+ motive
+ timeline
+ workeffort
+ vector
+ attribute
+ confidentiality
+ integrity
+ availability
diff --git a/meteor/private/veris.dotformat.txt b/meteor/private/veris.dotformat.txt
index e62fd3ee..5320f31a 100755
--- a/meteor/private/veris.dotformat.txt
+++ b/meteor/private/veris.dotformat.txt
@@ -189,11 +189,12 @@ targeted.Targeted
targeted.Unknown
targeted.NA
attribute.integrity.variety.Created account
+attribute.integrity.variety.Defacement
attribute.integrity.variety.Hardware tampering
attribute.integrity.variety.Alter behavior
attribute.integrity.variety.Fraudulent transaction
attribute.integrity.variety.Log tampering
-attribute.integrity.variety.Misappropriation
+attribute.integrity.variety.Repurpose
attribute.integrity.variety.Misrepresentation
attribute.integrity.variety.Modify configuration
attribute.integrity.variety.Modify privileges
@@ -209,6 +210,13 @@ attribute.availability.variety.Acceleration
attribute.availability.variety.Obscuration
attribute.availability.variety.Unknown
attribute.availability.variety.Other
+attribute.confidentiality.data_victim.Customer
+attribute.confidentiality.data_victim.Employee
+attribute.confidentiality.data_victim.Other
+attribute.confidentiality.data_victim.Partner
+attribute.confidentiality.data_victim.Patient
+attribute.confidentiality.data_victim.Student
+attribute.confidentiality.data_victim.Unknown
attribute.confidentiality.state.Stored
attribute.confidentiality.state.Stored encrypted
attribute.confidentiality.state.Stored unencrypted
@@ -221,12 +229,15 @@ attribute.confidentiality.data.variety.Credentials
attribute.confidentiality.data.variety.Bank
attribute.confidentiality.data.variety.Classified
attribute.confidentiality.data.variety.Copyrighted
+attribute.confidentiality.data.variety.Digital certificate
attribute.confidentiality.data.variety.Medical
attribute.confidentiality.data.variety.Payment
attribute.confidentiality.data.variety.Personal
attribute.confidentiality.data.variety.Internal
+attribute.confidentiality.data.variety.Source code
attribute.confidentiality.data.variety.System
attribute.confidentiality.data.variety.Secrets
+attribute.confidentiality.data.variety.Virtual currency
attribute.confidentiality.data.variety.Unknown
attribute.confidentiality.data.variety.Other
attribute.confidentiality.data_disclosure.Yes
@@ -237,21 +248,32 @@ discovery_method.Ext - actor disclosure
discovery_method.Ext - fraud detection
discovery_method.Ext - monitoring service
discovery_method.Ext - customer
-discovery_method.Ext - unrelated party
discovery_method.Ext - audit
discovery_method.Ext - unknown
discovery_method.Int - antivirus
discovery_method.Int - incident response
+discovery_method.Int - infrastructure monitoring
discovery_method.Int - financial audit
discovery_method.Int - fraud detection
discovery_method.Int - HIDS
-discovery_method.Int - IT audit
+discovery_method.Int - IT review
discovery_method.Int - log review
discovery_method.Int - NIDS
discovery_method.Ext - law enforcement
discovery_method.Int - security alarm
-discovery_method.Int - reported by user
+discovery_method.Int - reported by employee
discovery_method.Int - unknown
+discovery_method.Prt - monitoring service
+discovery_method.Prt - audit
+discovery_method.Prt - antivirus
+discovery_method.Prt - incident response
+discovery_method.Prt - unknown
+discovery_method.Prt - other
+discovery_method.Ext - incident response
+discovery_method.Ext - found documents
+discovery_method.Ext - suspicious traffic
+discovery_method.Ext - emergency response team
+discovery_method.Int - data loss prevention
discovery_method.Unknown
discovery_method.Other
actor.motive.NA
@@ -262,8 +284,21 @@ actor.motive.Fun
actor.motive.Grudge
actor.motive.Ideology
actor.motive.Convenience
+actor.motive.Secondary
actor.motive.Unknown
actor.motive.Other
+actor.internal.job_change.Hired
+actor.internal.job_change.Promoted
+actor.internal.job_change.Lateral move
+actor.internal.job_change.Resigned
+actor.internal.job_change.Let go
+actor.internal.job_change.Demoted
+actor.internal.job_change.Passed over
+actor.internal.job_change.Unknown
+actor.internal.job_change.Other
+actor.internal.job_change.Reprimanded
+actor.internal.job_change.Job eval
+actor.internal.job_change.Personal issues
actor.internal.variety.Auditor
actor.internal.variety.Call center
actor.internal.variety.Cashier
@@ -301,10 +336,20 @@ security_incident.Confirmed
security_incident.Suspected
security_incident.False positive
security_incident.Near miss
-asset.management.Internal
-asset.management.External
-asset.management.Unknown
-asset.management.NA
+asset.governance.Personally owned
+asset.governance.3rd party owned
+asset.governance.3rd party managed
+asset.governance.3rd party hosted
+asset.governance.Internally isolated
+asset.governance.Unknown
+asset.cloud.Hypervisor
+asset.cloud.Partner application
+asset.cloud.Hosting governance
+asset.cloud.Customer attack
+asset.cloud.Hosting error
+asset.cloud.User breakout
+asset.cloud.Unknown
+asset.cloud.Other
asset.variety.S - Authentication
asset.variety.S - Backup
asset.variety.S - Database
@@ -326,6 +371,7 @@ asset.variety.S - Web application
asset.variety.S - Code repository
asset.variety.S - VM host
asset.variety.S - Other
+asset.variety.S - Unknown
asset.variety.N - Access reader
asset.variety.N - Camera
asset.variety.N - Firewall
@@ -386,31 +432,6 @@ asset.variety.P - Manager
asset.variety.P - Partner
asset.variety.P - Other
asset.variety.Unknown
-asset.accessibility.External
-asset.accessibility.Internal
-asset.accessibility.Isolated
-asset.accessibility.Unknown
-asset.accessibility.NA
-asset.hosting.Internal
-asset.hosting.External shared
-asset.hosting.External dedicated
-asset.hosting.External
-asset.hosting.Unknown
-asset.hosting.NA
-asset.ownership.Victim
-asset.ownership.Employee
-asset.ownership.Partner
-asset.ownership.Customer
-asset.ownership.Unknown
-asset.ownership.NA
-asset.cloud.Hypervisor
-asset.cloud.Partner application
-asset.cloud.Hosting governance
-asset.cloud.Customer attack
-asset.cloud.Hosting error
-asset.cloud.User breakout
-asset.cloud.Unknown
-asset.cloud.Other
victim.employee_count.1 to 10
victim.employee_count.11 to 100
victim.employee_count.101 to 1000
@@ -682,6 +703,7 @@ action.malware.vector.Instant messaging
action.malware.vector.Network propagation
action.malware.vector.Remote injection
action.malware.vector.Removable media
+action.malware.vector.Software update
action.malware.vector.Web drive-by
action.malware.vector.Web download
action.malware.vector.Unknown
@@ -813,7 +835,7 @@ action.misuse.vector.Unknown
action.misuse.vector.Other
action.misuse.variety.Knowledge abuse
action.misuse.variety.Privilege abuse
-action.misuse.variety.Embezzlement
+action.misuse.variety.Possession abuse
action.misuse.variety.Data mishandling
action.misuse.variety.Email misuse
action.misuse.variety.Net misuse
@@ -857,6 +879,7 @@ action.hacking.variety.MitM
action.hacking.variety.Null byte injection
action.hacking.variety.Offline cracking
action.hacking.variety.OS commanding
+action.hacking.variety.Pass-the-hash
action.hacking.variety.Path traversal
action.hacking.variety.RFI
action.hacking.variety.Reverse engineering
@@ -879,27 +902,26 @@ action.hacking.variety.XQuery injection
action.hacking.variety.Virtual machine escape
action.hacking.variety.Unknown
action.hacking.variety.Other
-action.physical.vector.Privileged access
+action.physical.vector.Partner facility
+action.physical.vector.Partner vehicle
+action.physical.vector.Personal residence
+action.physical.vector.Personal vehicle
+action.physical.vector.Public facility
+action.physical.vector.Public vehicle
+action.physical.vector.Victim secure area
+action.physical.vector.Victim work area
+action.physical.vector.Victim public area
+action.physical.vector.Victim grounds
action.physical.vector.Visitor privileges
-action.physical.vector.Bypassed controls
-action.physical.vector.Disabled controls
action.physical.vector.Uncontrolled location
+action.physical.vector.Privileged access
action.physical.vector.Unknown
action.physical.vector.Other
-action.physical.location.Partner facility
-action.physical.location.Partner vehicle
-action.physical.location.Personal residence
-action.physical.location.Personal vehicle
-action.physical.location.Public facility
-action.physical.location.Public vehicle
-action.physical.location.Victim secure area
-action.physical.location.Victim work area
-action.physical.location.Victim public area
-action.physical.location.Victim grounds
-action.physical.location.Unknown
-action.physical.location.Other
action.physical.variety.Assault
-action.physical.variety.Sabotage
+action.physical.variety.Bypassed controls
+action.physical.variety.Destruction
+action.physical.variety.Disabled controls
+action.physical.variety.Skimmer
action.physical.variety.Snooping
action.physical.variety.Surveillance
action.physical.variety.Tampering
@@ -918,3 +940,11 @@ timeline.unit.Months
timeline.unit.Years
timeline.unit.Never
timeline.unit.Unknown
+workeffort.Minutes
+workeffort.Hours
+workeffort.Days
+workeffort.Weeks
+workeffort.Months
+workeffort.Years
+workeffort.Never
+workeffort.Unknown
\ No newline at end of file