Skip to content

Commit 1b392ec

Browse files
authored
Merge pull request #69 from semanticarts/issue-37-malware-capabilities-vocab
changed IRI fragment case to match prefLabel case
2 parents f409e05 + d9649bc commit 1b392ec

File tree

1 file changed

+67
-67
lines changed

1 file changed

+67
-67
lines changed

ontologies/vocabs.ttl

Lines changed: 67 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -1069,265 +1069,265 @@ Specifies an endpoint machine used for work by an organization that needs protec
10691069
skos:prefLabel "workstation"^^xsd:string ;
10701070
.
10711071

1072-
gist:_MalwareCapability_Accesses-Remote-Machines
1072+
gist:_MalwareCapability_Anti-Sandbox
1073+
a gist:MalwareCapability ;
1074+
skos:definition """STIX 2.1 description:
1075+
Indicates that the malware instance or family is able to prevent sandbox-based behavioral analysis or make it more difficult."""^^xsd:string ;
1076+
skos:prefLabel "anti-sandbox"^^xsd:string ;
1077+
.
1078+
1079+
gist:_MalwareCapability_accesses-remote-machines
10731080
a gist:MalwareCapability ;
10741081
skos:definition """STIX 2.1 description:
10751082
Indicates that the malware instance or family is able to access one or more remote machines."""^^xsd:string ;
10761083
skos:prefLabel "accesses-remote-machines"^^xsd:string ;
10771084
.
10781085

1079-
gist:_MalwareCapability_Anti-Debugging
1086+
gist:_MalwareCapability_anti-debugging
10801087
a gist:MalwareCapability ;
10811088
skos:definition """STIX 2.1 description:
10821089
Indicates that the malware instance or family is able to prevent itself from being debugged and/or from being run in a debugger or is able to make debugging more difficult."""^^xsd:string ;
10831090
skos:prefLabel "anti-debugging"^^xsd:string ;
10841091
.
10851092

1086-
gist:_MalwareCapability_Anti-Disassembly
1093+
gist:_MalwareCapability_anti-disassembly
10871094
a gist:MalwareCapability ;
10881095
skos:definition """STIX 2.1 description:
10891096
Indicates that the malware instance or family is able to prevent itself from being disassembled or make disassembly more difficult."""^^xsd:string ;
10901097
skos:prefLabel "anti-disassembly"^^xsd:string ;
10911098
.
10921099

1093-
gist:_MalwareCapability_Anti-Emulation
1100+
gist:_MalwareCapability_anti-emulation
10941101
a gist:MalwareCapability ;
10951102
skos:definition """STIX 2.1 description:
10961103
Indicates that the malware instance or family is able to prevent its execution inside of an emulator or is able to make emulation more difficult."""^^xsd:string ;
10971104
skos:prefLabel "anti-emulation"^^xsd:string ;
10981105
.
10991106

1100-
gist:_MalwareCapability_Anti-Memory-Forensics
1107+
gist:_MalwareCapability_anti-memory-forensics
11011108
a gist:MalwareCapability ;
11021109
skos:definition """STIX 2.1 description:
11031110
Indicates that the malware instance or family is able to prevent or make memory forensics more difficult."""^^xsd:string ;
11041111
skos:prefLabel "anti-memory-forensics"^^xsd:string ;
11051112
.
11061113

1107-
gist:_MalwareCapability_Anti-Sandbox
1108-
a gist:MalwareCapability ;
1109-
skos:definition """STIX 2.1 description:
1110-
Indicates that the malware instance or family is able to prevent sandbox-based behavioral analysis or make it more difficult."""^^xsd:string ;
1111-
skos:prefLabel "anti-sandbox"^^xsd:string ;
1112-
.
1113-
1114-
gist:_MalwareCapability_Anti-Vm
1114+
gist:_MalwareCapability_anti-vm
11151115
a gist:MalwareCapability ;
11161116
skos:definition """STIX 2.1 description:
11171117
Indicates that the malware instance or family is able to prevent virtual machine (VM) based behavioral analysis or make it more difficult."""^^xsd:string ;
11181118
skos:prefLabel "anti-vm"^^xsd:string ;
11191119
.
11201120

1121-
gist:_MalwareCapability_Captures-Input-Peripherals
1121+
gist:_MalwareCapability_captures-input-peripherals
11221122
a gist:MalwareCapability ;
11231123
skos:definition """STIX 2.1 description:
11241124
Indicates that the malware instance or family is able to capture data from a system's input peripheral devices, such as a keyboard or mouse. This includes things like keylogging."""^^xsd:string ;
11251125
skos:prefLabel "captures-input-peripherals"^^xsd:string ;
11261126
.
11271127

1128-
gist:_MalwareCapability_Captures-Output-Peripherals
1128+
gist:_MalwareCapability_captures-output-peripherals
11291129
a gist:MalwareCapability ;
11301130
skos:definition """STIX 2.1 description:
11311131
Indicates that the malware instance or family captures data sent to a system's output peripherals, such as a display. Examples include things like screen scraping."""^^xsd:string ;
11321132
skos:prefLabel "captures-output-peripherals"^^xsd:string ;
11331133
.
11341134

1135-
gist:_MalwareCapability_Captures-System-State-Data
1135+
gist:_MalwareCapability_captures-system-state-data
11361136
a gist:MalwareCapability ;
11371137
skos:definition """STIX 2.1 description:
11381138
Indicates that the malware instance or family is able to capture information about a system's state (e.g., data currently in its RAM)."""^^xsd:string ;
11391139
skos:prefLabel "captures-system-state-data"^^xsd:string ;
11401140
.
11411141

1142-
gist:_MalwareCapability_Commits-Fraud
1142+
gist:_MalwareCapability_cleans-traces-of-infection
1143+
a gist:MalwareCapability ;
1144+
skos:definition """STIX 2.1 description:
1145+
Indicates that the malware instance or family is able to clean traces of its infection (e.g., file system artifacts) from a system."""^^xsd:string ;
1146+
skos:prefLabel "cleans-traces-of-infection"^^xsd:string ;
1147+
.
1148+
1149+
gist:_MalwareCapability_commits-fraud
11431150
a gist:MalwareCapability ;
11441151
skos:definition """STIX 2.1 description:
11451152
Indicates that the malware instance or family commits fraud, such as click fraud (for example)."""^^xsd:string ;
11461153
skos:prefLabel "commits-fraud"^^xsd:string ;
11471154
.
11481155

1149-
gist:_MalwareCapability_Communicates-With-C2
1156+
gist:_MalwareCapability_communicates-with-c2
11501157
a gist:MalwareCapability ;
11511158
skos:definition """STIX 2.1 description:
11521159
Indicates that the malware instance or family is able to communicate (i.e., send or receive data) with a command and control (C2) server."""^^xsd:string ;
11531160
skos:prefLabel "communicates-with-c2"^^xsd:string ;
11541161
.
11551162

1156-
gist:_MalwareCapability_Compromises-Data-Availability
1163+
gist:_MalwareCapability_compromises-data-availability
11571164
a gist:MalwareCapability ;
11581165
skos:definition """STIX 2.1 description:
11591166
Indicates that the malware instance or family is able to compromise the availability of data on the local system on which it is executing and/or one or more remote systems. For example, encrypting data on disk, as done by ransomware."""^^xsd:string ;
11601167
skos:prefLabel "compromises-data-availability"^^xsd:string ;
11611168
.
11621169

1163-
gist:_MalwareCapability_Compromises-Data-Integrity
1170+
gist:_MalwareCapability_compromises-data-integrity
11641171
a gist:MalwareCapability ;
11651172
skos:definition """STIX 2.1 description:
11661173
Indicates that the malware instance or family is able to compromise the integrity of some data that resides on (e.g., in the case of files) or is received/transmitted (e.g., in the case of network traffic) by the system on which it is executing."""^^xsd:string ;
11671174
skos:prefLabel "compromises-data-integrity"^^xsd:string ;
11681175
.
11691176

1170-
gist:_MalwareCapability_Compromises-System-Availability
1177+
gist:_MalwareCapability_compromises-system-availability
11711178
a gist:MalwareCapability ;
11721179
skos:definition """STIX 2.1 description:
11731180
Indicates that the malware instance or family is able to consume system resources for its malicious purposes, such as password cracking or participating in a DDoS botnet, thereby compromising the availability of the local system and/or one or more remote systems."""^^xsd:string ;
11741181
skos:prefLabel "compromises-system-availability"^^xsd:string ;
11751182
.
11761183

1177-
gist:_MalwareCapability_Controls-Local-Machine
1184+
gist:_MalwareCapability_controls-local-machine
11781185
a gist:MalwareCapability ;
11791186
skos:definition """STIX 2.1 description:
11801187
Indicates that the malware instance or family is able to control the machine on which it is executing (e.g., RATs)."""^^xsd:string ;
11811188
skos:prefLabel "controls-local-machine"^^xsd:string ;
11821189
.
11831190

1184-
gist:_MalwareCapability_Degrades-Security-Software
1191+
gist:_MalwareCapability_degrades-security-software
11851192
a gist:MalwareCapability ;
11861193
skos:definition """STIX 2.1 description:
11871194
Indicates that the malware instance or family is able to bypass or disable security programs or operating system security features on a system (including mobile devices), either by stopping them from executing or by making changes to their code or configuration parameters. For example, malware that blocks the local machine from accessing the websites of security vendors."""^^xsd:string ;
11881195
skos:prefLabel "degrades-security-software"^^xsd:string ;
11891196
.
11901197

1191-
gist:_MalwareCapability_Degrades-System-Updates
1198+
gist:_MalwareCapability_degrades-system-updates
11921199
a gist:MalwareCapability ;
11931200
skos:definition """STIX 2.1 description:
11941201
Indicates that the malware instance or family is able to disable the downloading and installation of system updates and patches."""^^xsd:string ;
11951202
skos:prefLabel "degrades-system-updates"^^xsd:string ;
11961203
.
11971204

1198-
gist:_MalwareCapability_Determines-C2-Server
1205+
gist:_MalwareCapability_determines-c2-server
11991206
a gist:MalwareCapability ;
12001207
skos:definition """STIX 2.1 description:
12011208
Indicates that the malware instance or family is able to identify one or more command and control (C2) servers with which to communicate (e.g., DGA)."""^^xsd:string ;
12021209
skos:prefLabel "determines-c2-server"^^xsd:string ;
12031210
.
12041211

1205-
gist:_MalwareCapability_Evades-Av
1212+
gist:_MalwareCapability_emails-spam
1213+
a gist:MalwareCapability ;
1214+
skos:definition """STIX 2.1 description:
1215+
Indicates that the malware instance or family is able to send spam email messages."""^^xsd:string ;
1216+
skos:prefLabel "emails-spam"^^xsd:string ;
1217+
.
1218+
1219+
gist:_MalwareCapability_escalates-privileges
1220+
a gist:MalwareCapability ;
1221+
skos:definition """STIX 2.1 description:
1222+
Indicates that the malware instance or family is able to escalate the privileges under which it is executing."""^^xsd:string ;
1223+
skos:prefLabel "escalates-privileges"^^xsd:string ;
1224+
.
1225+
1226+
gist:_MalwareCapability_evades-av
12061227
a gist:MalwareCapability ;
12071228
skos:definition """STIX 2.1 description:
12081229
Indicates that the malware instance or family is able to evade detection by antivirus tools."""^^xsd:string ;
12091230
skos:prefLabel "evades-av"^^xsd:string ;
12101231
.
12111232

1212-
gist:_MalwareCapability_Exfiltrates-Data
1233+
gist:_MalwareCapability_exfiltrates-data
12131234
a gist:MalwareCapability ;
12141235
skos:definition """STIX 2.1 description:
12151236
Indicates that the malware instance or family is able to gather, prepare, (possibly obfuscate) data and transmit it to exfiltration points."""^^xsd:string ;
12161237
skos:prefLabel "exfiltrates-data"^^xsd:string ;
12171238
.
12181239

1219-
gist:_MalwareCapability_Fingerprints-Host
1240+
gist:_MalwareCapability_fingerprints-host
12201241
a gist:MalwareCapability ;
12211242
skos:definition """STIX 2.1 description:
12221243
Indicates that the malware instance or family is able to fingerprint or probe the configuration of the host system on which it is executing for the purpose of altering its behavior based on this environment."""^^xsd:string ;
12231244
skos:prefLabel "fingerprints-host"^^xsd:string ;
12241245
.
12251246

1226-
gist:_MalwareCapability_Hides-Artifacts
1247+
gist:_MalwareCapability_hides-artifacts
12271248
a gist:MalwareCapability ;
12281249
skos:definition """STIX 2.1 description:
12291250
Indicates that the malware instance or family is able to hide its artifacts, such as files and open ports."""^^xsd:string ;
12301251
skos:prefLabel "hides-artifacts"^^xsd:string ;
12311252
.
12321253

1233-
gist:_MalwareCapability_Infects-Files
1254+
gist:_MalwareCapability_hides-executing-code
1255+
a gist:MalwareCapability ;
1256+
skos:definition """STIX 2.1 description:
1257+
Indicates that the malware instance or family is able to hide its code by compromising the bootloader, kernel modules, hypervisor, etc."""^^xsd:string ;
1258+
skos:prefLabel "hides-executing-code"^^xsd:string ;
1259+
.
1260+
1261+
gist:_MalwareCapability_infects-files
12341262
a gist:MalwareCapability ;
12351263
skos:definition """STIX 2.1 description:
12361264
Indicates that the malware instance or family is able to infect one or more files on the system on which it executes. For example, malware which injects a malicious payload into all PDFs on a host as a means of propagation."""^^xsd:string ;
12371265
skos:prefLabel "infects-files"^^xsd:string ;
12381266
.
12391267

1240-
gist:_MalwareCapability_Infects-Remote-Machines
1268+
gist:_MalwareCapability_infects-remote-machines
12411269
a gist:MalwareCapability ;
12421270
skos:definition """STIX 2.1 description:
12431271
Indicates that the malware instance or family is able to self-propagate to a remote machine or infect a remote machine with malware that is different than itself."""^^xsd:string ;
12441272
skos:prefLabel "infects-remote-machines"^^xsd:string ;
12451273
.
12461274

1247-
gist:_MalwareCapability_Installs-Other-Components
1275+
gist:_MalwareCapability_installs-other-components
12481276
a gist:MalwareCapability ;
12491277
skos:definition """STIX 2.1 description:
12501278
Indicates that the malware instance or family is able to install additional components. This encompasses the dropping/downloading of other malicious components such as libraries, other malware, and tools."""^^xsd:string ;
12511279
skos:prefLabel "installs-other-components"^^xsd:string ;
12521280
.
12531281

1254-
gist:_MalwareCapability_Persists-After-System-Reboot
1282+
gist:_MalwareCapability_persists-after-system-reboot
12551283
a gist:MalwareCapability ;
12561284
skos:definition """STIX 2.1 description:
12571285
Indicates that the malware instance or family is able to continue executing after the reboot of the system on which it is resident."""^^xsd:string ;
12581286
skos:prefLabel "persists-after-system-reboot"^^xsd:string ;
12591287
.
12601288

1261-
gist:_MalwareCapability_Prevents-Artifact-Access
1289+
gist:_MalwareCapability_prevents-artifact-access
12621290
a gist:MalwareCapability ;
12631291
skos:definition """STIX 2.1 description:
12641292
Indicates that the malware instance or family is able to prevent its artifacts (e.g., files, registry keys, etc.) from being accessed."""^^xsd:string ;
12651293
skos:prefLabel "prevents-artifact-access"^^xsd:string ;
12661294
.
12671295

1268-
gist:_MalwareCapability_Prevents-Artifact-Deletion
1296+
gist:_MalwareCapability_prevents-artifact-deletion
12691297
a gist:MalwareCapability ;
12701298
skos:definition """STIX 2.1 description:
12711299
Indicates that the malware instance or family is able to prevent its artifacts (e.g., files, registry keys, etc.) from being deleted."""^^xsd:string ;
12721300
skos:prefLabel "prevents-artifact-deletion"^^xsd:string ;
12731301
.
12741302

1275-
gist:_MalwareCapability_Probes-Network-Environment
1303+
gist:_MalwareCapability_probes-network-environment
12761304
a gist:MalwareCapability ;
12771305
skos:definition """STIX 2.1 description:
12781306
Indicates that the malware instance or family is able to probe the properties of its network environment, e.g. to determine whether it funnels traffic through a proxy."""^^xsd:string ;
12791307
skos:prefLabel "probes-network-environment"^^xsd:string ;
12801308
.
12811309

1282-
gist:_MalwareCapability_Self-Modifies
1310+
gist:_MalwareCapability_self-modifies
12831311
a gist:MalwareCapability ;
12841312
skos:definition """STIX 2.1 description:
12851313
Indicates that the malware instance or family is able to modify itself."""^^xsd:string ;
12861314
skos:prefLabel "self-modifies"^^xsd:string ;
12871315
.
12881316

1289-
gist:_MalwareCapability_Steals-Authentication-Credentials
1317+
gist:_MalwareCapability_steals-authentication-credentials
12901318
a gist:MalwareCapability ;
12911319
skos:definition """STIX 2.1 description:
12921320
Indicates that the malware instance is able to steal authentication credentials."""^^xsd:string ;
12931321
skos:prefLabel "steals-authentication-credentials"^^xsd:string ;
12941322
.
12951323

1296-
gist:_MalwareCapability_Violates-System-Operational-Integrity
1324+
gist:_MalwareCapability_violates-system-operational-integrity
12971325
a gist:MalwareCapability ;
12981326
skos:definition """STIX 2.1 description:
12991327
Indicates that the malware instance or family is able to compromise the operational integrity of the system on which it is executing and/or one or more remote systems, e.g., by causing them to operate beyond their set of specified operational parameters. For example, malware that causes the CPU fan on the machine that it is executing to spin at a higher than normal speed."""^^xsd:string ;
13001328
skos:prefLabel "violates-system-operational-integrity"^^xsd:string ;
13011329
.
13021330

1303-
gist:_MalwareCapability_cleans-traces-of-infection
1304-
a gist:MalwareCapability ;
1305-
skos:definition """STIX 2.1 description:
1306-
Indicates that the malware instance or family is able to clean traces of its infection (e.g., file system artifacts) from a system."""^^xsd:string ;
1307-
skos:prefLabel "cleans-traces-of-infection"^^xsd:string ;
1308-
.
1309-
1310-
gist:_MalwareCapability_eEails-Spam
1311-
a gist:MalwareCapability ;
1312-
skos:definition """STIX 2.1 description:
1313-
Indicates that the malware instance or family is able to send spam email messages."""^^xsd:string ;
1314-
skos:prefLabel "emails-spam"^^xsd:string ;
1315-
.
1316-
1317-
gist:_MalwareCapability_escalates-privileges
1318-
a gist:MalwareCapability ;
1319-
skos:definition """STIX 2.1 description:
1320-
Indicates that the malware instance or family is able to escalate the privileges under which it is executing."""^^xsd:string ;
1321-
skos:prefLabel "escalates-privileges"^^xsd:string ;
1322-
.
1323-
1324-
gist:_MalwareCapability_hides-executing-code
1325-
a gist:MalwareCapability ;
1326-
skos:definition """STIX 2.1 description:
1327-
Indicates that the malware instance or family is able to hide its code by compromising the bootloader, kernel modules, hypervisor, etc."""^^xsd:string ;
1328-
skos:prefLabel "hides-executing-code"^^xsd:string ;
1329-
.
1330-
13311331
gist:_MalwareResult_benign
13321332
a gist:MalwareResult ;
13331333
skos:definition """STIX 2.1 description:

0 commit comments

Comments
 (0)