|
13 | 13 | }, |
14 | 14 | "@graph": [ |
15 | 15 | { |
16 | | - "@id": "kb:Tool-0b635b9f-bdb8-4492-9b4e-dec6797b82db", |
| 16 | + "@id": "kb:tool-0b635b9f-bdb8-4492-9b4e-dec6797b82db", |
17 | 17 | "@type": "uco-tool:Tool", |
18 | 18 | "uco-core:name": "IDA Pro", |
19 | 19 | "uco-tool:toolType": "binary code analysis tool", |
|
23 | 23 | "uco-tool:version": "7.7" |
24 | 24 | }, |
25 | 25 | { |
26 | | - "@id": "kb:Tool-be707329-48fe-4d5d-84f3-7978ba63869e", |
| 26 | + "@id": "kb:tool-be707329-48fe-4d5d-84f3-7978ba63869e", |
27 | 27 | "@type": "drafting:ConfiguredTool", |
28 | 28 | "drafting:isConfigurationOf": { |
29 | | - "@id": "kb:Tool-0b635b9f-bdb8-4492-9b4e-dec6797b82db" |
| 29 | + "@id": "kb:tool-0b635b9f-bdb8-4492-9b4e-dec6797b82db" |
30 | 30 | }, |
31 | 31 | "uco-core:name": "IDA Pro", |
32 | 32 | "uco-tool:toolType": "binary code analysis tool", |
|
47 | 47 | ] |
48 | 48 | }, |
49 | 49 | { |
50 | | - "@id": "kb:Action-94446a56-1f78-42e4-a4f4-ec94ad7e9118", |
| 50 | + "@id": "kb:action-94446a56-1f78-42e4-a4f4-ec94ad7e9118", |
51 | 51 | "@type": "uco-action:Action", |
52 | 52 | "uco-core:name": "Reverse engineer software to determine malicious intent", |
53 | 53 | "uco-action:startTime": { |
|
62 | 62 | "@id": "kb:9b82c2bc-10f7-47b2-81a8-443a9f458440" |
63 | 63 | }, |
64 | 64 | "uco-action:performer": { |
65 | | - "@id": "kb:Analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7" |
| 65 | + "@id": "kb:analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7" |
66 | 66 | }, |
67 | 67 | "uco-action:instrument": { |
68 | | - "@id": "kb:Tool-be707329-48fe-4d5d-84f3-7978ba63869e" |
| 68 | + "@id": "kb:tool-be707329-48fe-4d5d-84f3-7978ba63869e" |
69 | 69 | }, |
70 | 70 | "uco-action:environment": { |
71 | | - "@id": "kb:Computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa" |
| 71 | + "@id": "kb:computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa" |
72 | 72 | }, |
73 | 73 | "uco-action:object": [ |
74 | 74 | { |
75 | | - "@id": "kb:Software1-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
| 75 | + "@id": "kb:software-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
76 | 76 | } |
77 | 77 | ], |
78 | 78 | "uco-action:result": [ |
79 | 79 | { |
80 | | - "@id": "kb:ProvenanceRecord-aa90afe6-9069-49bb-8ad8-b05d3f4f143b" |
| 80 | + "@id": "kb:provenancerecord-aa90afe6-9069-49bb-8ad8-b05d3f4f143b" |
81 | 81 | } |
82 | 82 | ] |
83 | 83 | }, |
84 | 84 | { |
85 | | - "@id": "kb:Tool-f40e2a5f-7fdf-491f-8c87-b4cb766a6377", |
| 85 | + "@id": "kb:tool-f40e2a5f-7fdf-491f-8c87-b4cb766a6377", |
86 | 86 | "@type": "drafting:ConfiguredTool", |
87 | 87 | "drafting:isConfigurationOf": { |
88 | | - "@id": "kb:Tool-0b635b9f-bdb8-4492-9b4e-dec6797b82db" |
| 88 | + "@id": "kb:tool-0b635b9f-bdb8-4492-9b4e-dec6797b82db" |
89 | 89 | }, |
90 | 90 | "uco-core:name": "IDA Pro", |
91 | 91 | "uco-tool:toolType": "binary code analysis tool", |
|
106 | 106 | ] |
107 | 107 | }, |
108 | 108 | { |
109 | | - "@id": "kb:Action-ce95584e-5065-4287-83fd-81df2ac72180", |
| 109 | + "@id": "kb:action-ce95584e-5065-4287-83fd-81df2ac72180", |
110 | 110 | "@type": "uco-action:Action", |
111 | 111 | "uco-core:name": "Reverse engineer software to determine malicious intent", |
112 | 112 | "uco-action:startTime": { |
|
121 | 121 | "@id": "kb:9b82c2bc-10f7-47b2-81a8-443a9f458440" |
122 | 122 | }, |
123 | 123 | "uco-action:performer": { |
124 | | - "@id": "kb:Analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7" |
| 124 | + "@id": "kb:analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7" |
125 | 125 | }, |
126 | 126 | "uco-action:instrument": { |
127 | | - "@id": "kb:Tool-f40e2a5f-7fdf-491f-8c87-b4cb766a6377" |
| 127 | + "@id": "kb:tool-f40e2a5f-7fdf-491f-8c87-b4cb766a6377" |
128 | 128 | }, |
129 | 129 | "uco-action:environment": { |
130 | | - "@id": "kb:Computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa" |
| 130 | + "@id": "kb:computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa" |
131 | 131 | }, |
132 | 132 | "uco-action:object": [ |
133 | 133 | { |
134 | | - "@id": "kb:Software1-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
| 134 | + "@id": "kb:software-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
135 | 135 | } |
136 | 136 | ], |
137 | 137 | "uco-action:result": [ |
138 | 138 | { |
139 | | - "@id": "kb:ProvenanceRecord-8cf982c3-f6d7-4e11-9acf-d5dcc4390f42" |
| 139 | + "@id": "kb:provenancerecord-8cf982c3-f6d7-4e11-9acf-d5dcc4390f42" |
140 | 140 | } |
141 | 141 | ] |
142 | 142 | }, |
143 | 143 | { |
144 | | - "@id": "kb:Tool-134e3cc0-7f74-4ea2-9ac1-3c447f4f6195", |
| 144 | + "@id": "kb:tool-134e3cc0-7f74-4ea2-9ac1-3c447f4f6195", |
145 | 145 | "@type": "drafting:ConfiguredTool", |
146 | 146 | "drafting:isConfigurationOf": { |
147 | | - "@id": "kb:Tool-0b635b9f-bdb8-4492-9b4e-dec6797b82db" |
| 147 | + "@id": "kb:tool-0b635b9f-bdb8-4492-9b4e-dec6797b82db" |
148 | 148 | }, |
149 | 149 | "uco-core:name": "IDA Pro", |
150 | 150 | "uco-tool:toolType": "binary code analysis tool", |
|
159 | 159 | "@type": "uco-tool:ConfigurationSettingType", |
160 | 160 | "uco-tool:itemName": "ruleset", |
161 | 161 | "uco-tool:itemObject": { |
162 | | - "@id": "kb:File-0fedea11-3c8b-400c-9cdb-593edc146194" |
| 162 | + "@id": "kb:file-0fedea11-3c8b-400c-9cdb-593edc146194" |
163 | 163 | }, |
164 | 164 | "uco-tool:itemType": "external-ruleset" |
165 | 165 | } |
166 | 166 | } |
167 | 167 | ] |
168 | 168 | }, |
169 | 169 | { |
170 | | - "@id": "kb:Action-1a8cd716-c0c6-42d4-955f-19b2b9f0e3e6", |
| 170 | + "@id": "kb:action-1a8cd716-c0c6-42d4-955f-19b2b9f0e3e6", |
171 | 171 | "@type": "uco-action:Action", |
172 | 172 | "uco-core:name": "Reverse engineer software to determine malicious intent", |
173 | 173 | "uco-action:startTime": { |
|
182 | 182 | "@id": "kb:9b82c2bc-10f7-47b2-81a8-443a9f458440" |
183 | 183 | }, |
184 | 184 | "uco-action:performer": { |
185 | | - "@id": "kb:Analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7" |
| 185 | + "@id": "kb:analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7" |
186 | 186 | }, |
187 | 187 | "uco-action:instrument": { |
188 | | - "@id": "kb:Tool-134e3cc0-7f74-4ea2-9ac1-3c447f4f6195" |
| 188 | + "@id": "kb:tool-134e3cc0-7f74-4ea2-9ac1-3c447f4f6195" |
189 | 189 | }, |
190 | 190 | "uco-action:environment": { |
191 | | - "@id": "kb:Computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa" |
| 191 | + "@id": "kb:computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa" |
192 | 192 | }, |
193 | 193 | "uco-action:object": [ |
194 | 194 | { |
195 | | - "@id": "kb:Software1-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
| 195 | + "@id": "kb:software-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
196 | 196 | } |
197 | 197 | ], |
198 | 198 | "uco-action:result": [ |
199 | 199 | { |
200 | | - "@id": "kb:ProvenanceRecord-c462c7de-0391-4c88-a17c-1f9607fb0c46" |
| 200 | + "@id": "kb:provenancerecord-c462c7de-0391-4c88-a17c-1f9607fb0c46" |
201 | 201 | } |
202 | 202 | ] |
203 | 203 | }, |
204 | 204 | { |
205 | | - "@id": "kb:Action-5f6d3a6e-99ee-48bc-9a65-a7e0ae5d9fb8", |
| 205 | + "@id": "kb:action-5f6d3a6e-99ee-48bc-9a65-a7e0ae5d9fb8", |
206 | 206 | "@type": "uco-action:Action", |
207 | 207 | "uco-core:name": "Reverse engineer software to determine malicious intent", |
208 | 208 | "uco-action:startTime": { |
|
217 | 217 | "@id": "kb:9b82c2bc-10f7-47b2-81a8-443a9f458440" |
218 | 218 | }, |
219 | 219 | "uco-action:performer": { |
220 | | - "@id": "kb:Analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7" |
| 220 | + "@id": "kb:analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7" |
221 | 221 | }, |
222 | 222 | "uco-action:instrument": { |
223 | | - "@id": "kb:Tool-134e3cc0-7f74-4ea2-9ac1-3c447f4f6195" |
| 223 | + "@id": "kb:tool-134e3cc0-7f74-4ea2-9ac1-3c447f4f6195" |
224 | 224 | }, |
225 | 225 | "uco-action:environment": { |
226 | | - "@id": "kb:Computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa" |
| 226 | + "@id": "kb:computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa" |
227 | 227 | }, |
228 | 228 | "uco-action:object": [ |
229 | 229 | { |
230 | | - "@id": "kb:Software2-bec1d8eb-2db1-444d-9175-b3c60ac47410" |
| 230 | + "@id": "kb:software-bec1d8eb-2db1-444d-9175-b3c60ac47410" |
231 | 231 | } |
232 | 232 | ], |
233 | 233 | "uco-action:result": [ |
234 | 234 | { |
235 | | - "@id": "kb:ProvenanceRecord-0db01c96-f34f-431a-9aff-e1cc4fac9842" |
| 235 | + "@id": "kb:provenancerecord-0db01c96-f34f-431a-9aff-e1cc4fac9842" |
236 | 236 | } |
237 | 237 | ] |
238 | 238 | }, |
|
241 | 241 | "@type": "uco-location:Location" |
242 | 242 | }, |
243 | 243 | { |
244 | | - "@id": "kb:Analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7", |
| 244 | + "@id": "kb:analyst-c1d5f9cc-10cd-4fdb-9570-e9d00e6df6f7", |
245 | 245 | "@type": "uco-identity:Identity" |
246 | 246 | }, |
247 | 247 | { |
248 | | - "@id": "kb:Computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa", |
| 248 | + "@id": "kb:computer-e640f827-1f5b-4e8a-bd89-7afdf2c85caa", |
249 | 249 | "@type": "uco-observable:Device" |
250 | 250 | }, |
251 | 251 | { |
252 | | - "@id": "kb:ProvenanceRecord-0db01c96-f34f-431a-9aff-e1cc4fac9842", |
| 252 | + "@id": "kb:provenancerecord-0db01c96-f34f-431a-9aff-e1cc4fac9842", |
253 | 253 | "@type": "case-investigation:ProvenanceRecord", |
254 | 254 | "uco-core:object": { |
255 | | - "@id": "kb:Software2-bec1d8eb-2db1-444d-9175-b3c60ac47410" |
| 255 | + "@id": "kb:software-bec1d8eb-2db1-444d-9175-b3c60ac47410" |
256 | 256 | } |
257 | 257 | }, |
258 | 258 | { |
259 | | - "@id": "kb:ProvenanceRecord-8cf982c3-f6d7-4e11-9acf-d5dcc4390f42", |
| 259 | + "@id": "kb:provenancerecord-8cf982c3-f6d7-4e11-9acf-d5dcc4390f42", |
260 | 260 | "@type": "case-investigation:ProvenanceRecord", |
261 | 261 | "uco-core:object": { |
262 | | - "@id": "kb:Software1-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
| 262 | + "@id": "kb:software-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
263 | 263 | } |
264 | 264 | }, |
265 | 265 | { |
266 | | - "@id": "kb:ProvenanceRecord-aa90afe6-9069-49bb-8ad8-b05d3f4f143b", |
| 266 | + "@id": "kb:provenancerecord-aa90afe6-9069-49bb-8ad8-b05d3f4f143b", |
267 | 267 | "@type": "case-investigation:ProvenanceRecord", |
268 | 268 | "uco-core:object": { |
269 | | - "@id": "kb:Software1-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
| 269 | + "@id": "kb:software-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
270 | 270 | } |
271 | 271 | }, |
272 | 272 | { |
273 | | - "@id": "kb:ProvenanceRecord-c462c7de-0391-4c88-a17c-1f9607fb0c46", |
| 273 | + "@id": "kb:provenancerecord-c462c7de-0391-4c88-a17c-1f9607fb0c46", |
274 | 274 | "@type": "case-investigation:ProvenanceRecord", |
275 | 275 | "uco-core:object": { |
276 | | - "@id": "kb:Software1-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
| 276 | + "@id": "kb:software-2ef1d3c7-eb2d-470d-89ea-291daed6549b" |
277 | 277 | } |
278 | 278 | }, |
279 | 279 | { |
280 | | - "@id": "kb:Software1-2ef1d3c7-eb2d-470d-89ea-291daed6549b", |
| 280 | + "@id": "kb:software-2ef1d3c7-eb2d-470d-89ea-291daed6549b", |
281 | 281 | "@type": "uco-observable:File" |
282 | 282 | }, |
283 | 283 | { |
284 | | - "@id": "kb:Software2-bec1d8eb-2db1-444d-9175-b3c60ac47410", |
| 284 | + "@id": "kb:software-bec1d8eb-2db1-444d-9175-b3c60ac47410", |
285 | 285 | "@type": "uco-observable:File" |
286 | 286 | }, |
287 | 287 | { |
|
0 commit comments