Skip to content

Commit d9649bc

Browse files
committed
changed IRI fragment case to match prefLabel case
1 parent effb2da commit d9649bc

File tree

1 file changed

+67
-67
lines changed

1 file changed

+67
-67
lines changed

ontologies/vocabs.ttl

Lines changed: 67 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -1062,265 +1062,265 @@ Specifies an endpoint machine used for work by an organization that needs protec
10621062
skos:prefLabel "workstation"^^xsd:string ;
10631063
.
10641064

1065-
gist:_MalwareCapability_Accesses-Remote-Machines
1065+
gist:_MalwareCapability_Anti-Sandbox
1066+
a gist:MalwareCapability ;
1067+
skos:definition """STIX 2.1 description:
1068+
Indicates that the malware instance or family is able to prevent sandbox-based behavioral analysis or make it more difficult."""^^xsd:string ;
1069+
skos:prefLabel "anti-sandbox"^^xsd:string ;
1070+
.
1071+
1072+
gist:_MalwareCapability_accesses-remote-machines
10661073
a gist:MalwareCapability ;
10671074
skos:definition """STIX 2.1 description:
10681075
Indicates that the malware instance or family is able to access one or more remote machines."""^^xsd:string ;
10691076
skos:prefLabel "accesses-remote-machines"^^xsd:string ;
10701077
.
10711078

1072-
gist:_MalwareCapability_Anti-Debugging
1079+
gist:_MalwareCapability_anti-debugging
10731080
a gist:MalwareCapability ;
10741081
skos:definition """STIX 2.1 description:
10751082
Indicates that the malware instance or family is able to prevent itself from being debugged and/or from being run in a debugger or is able to make debugging more difficult."""^^xsd:string ;
10761083
skos:prefLabel "anti-debugging"^^xsd:string ;
10771084
.
10781085

1079-
gist:_MalwareCapability_Anti-Disassembly
1086+
gist:_MalwareCapability_anti-disassembly
10801087
a gist:MalwareCapability ;
10811088
skos:definition """STIX 2.1 description:
10821089
Indicates that the malware instance or family is able to prevent itself from being disassembled or make disassembly more difficult."""^^xsd:string ;
10831090
skos:prefLabel "anti-disassembly"^^xsd:string ;
10841091
.
10851092

1086-
gist:_MalwareCapability_Anti-Emulation
1093+
gist:_MalwareCapability_anti-emulation
10871094
a gist:MalwareCapability ;
10881095
skos:definition """STIX 2.1 description:
10891096
Indicates that the malware instance or family is able to prevent its execution inside of an emulator or is able to make emulation more difficult."""^^xsd:string ;
10901097
skos:prefLabel "anti-emulation"^^xsd:string ;
10911098
.
10921099

1093-
gist:_MalwareCapability_Anti-Memory-Forensics
1100+
gist:_MalwareCapability_anti-memory-forensics
10941101
a gist:MalwareCapability ;
10951102
skos:definition """STIX 2.1 description:
10961103
Indicates that the malware instance or family is able to prevent or make memory forensics more difficult."""^^xsd:string ;
10971104
skos:prefLabel "anti-memory-forensics"^^xsd:string ;
10981105
.
10991106

1100-
gist:_MalwareCapability_Anti-Sandbox
1101-
a gist:MalwareCapability ;
1102-
skos:definition """STIX 2.1 description:
1103-
Indicates that the malware instance or family is able to prevent sandbox-based behavioral analysis or make it more difficult."""^^xsd:string ;
1104-
skos:prefLabel "anti-sandbox"^^xsd:string ;
1105-
.
1106-
1107-
gist:_MalwareCapability_Anti-Vm
1107+
gist:_MalwareCapability_anti-vm
11081108
a gist:MalwareCapability ;
11091109
skos:definition """STIX 2.1 description:
11101110
Indicates that the malware instance or family is able to prevent virtual machine (VM) based behavioral analysis or make it more difficult."""^^xsd:string ;
11111111
skos:prefLabel "anti-vm"^^xsd:string ;
11121112
.
11131113

1114-
gist:_MalwareCapability_Captures-Input-Peripherals
1114+
gist:_MalwareCapability_captures-input-peripherals
11151115
a gist:MalwareCapability ;
11161116
skos:definition """STIX 2.1 description:
11171117
Indicates that the malware instance or family is able to capture data from a system's input peripheral devices, such as a keyboard or mouse. This includes things like keylogging."""^^xsd:string ;
11181118
skos:prefLabel "captures-input-peripherals"^^xsd:string ;
11191119
.
11201120

1121-
gist:_MalwareCapability_Captures-Output-Peripherals
1121+
gist:_MalwareCapability_captures-output-peripherals
11221122
a gist:MalwareCapability ;
11231123
skos:definition """STIX 2.1 description:
11241124
Indicates that the malware instance or family captures data sent to a system's output peripherals, such as a display. Examples include things like screen scraping."""^^xsd:string ;
11251125
skos:prefLabel "captures-output-peripherals"^^xsd:string ;
11261126
.
11271127

1128-
gist:_MalwareCapability_Captures-System-State-Data
1128+
gist:_MalwareCapability_captures-system-state-data
11291129
a gist:MalwareCapability ;
11301130
skos:definition """STIX 2.1 description:
11311131
Indicates that the malware instance or family is able to capture information about a system's state (e.g., data currently in its RAM)."""^^xsd:string ;
11321132
skos:prefLabel "captures-system-state-data"^^xsd:string ;
11331133
.
11341134

1135-
gist:_MalwareCapability_Commits-Fraud
1135+
gist:_MalwareCapability_cleans-traces-of-infection
1136+
a gist:MalwareCapability ;
1137+
skos:definition """STIX 2.1 description:
1138+
Indicates that the malware instance or family is able to clean traces of its infection (e.g., file system artifacts) from a system."""^^xsd:string ;
1139+
skos:prefLabel "cleans-traces-of-infection"^^xsd:string ;
1140+
.
1141+
1142+
gist:_MalwareCapability_commits-fraud
11361143
a gist:MalwareCapability ;
11371144
skos:definition """STIX 2.1 description:
11381145
Indicates that the malware instance or family commits fraud, such as click fraud (for example)."""^^xsd:string ;
11391146
skos:prefLabel "commits-fraud"^^xsd:string ;
11401147
.
11411148

1142-
gist:_MalwareCapability_Communicates-With-C2
1149+
gist:_MalwareCapability_communicates-with-c2
11431150
a gist:MalwareCapability ;
11441151
skos:definition """STIX 2.1 description:
11451152
Indicates that the malware instance or family is able to communicate (i.e., send or receive data) with a command and control (C2) server."""^^xsd:string ;
11461153
skos:prefLabel "communicates-with-c2"^^xsd:string ;
11471154
.
11481155

1149-
gist:_MalwareCapability_Compromises-Data-Availability
1156+
gist:_MalwareCapability_compromises-data-availability
11501157
a gist:MalwareCapability ;
11511158
skos:definition """STIX 2.1 description:
11521159
Indicates that the malware instance or family is able to compromise the availability of data on the local system on which it is executing and/or one or more remote systems. For example, encrypting data on disk, as done by ransomware."""^^xsd:string ;
11531160
skos:prefLabel "compromises-data-availability"^^xsd:string ;
11541161
.
11551162

1156-
gist:_MalwareCapability_Compromises-Data-Integrity
1163+
gist:_MalwareCapability_compromises-data-integrity
11571164
a gist:MalwareCapability ;
11581165
skos:definition """STIX 2.1 description:
11591166
Indicates that the malware instance or family is able to compromise the integrity of some data that resides on (e.g., in the case of files) or is received/transmitted (e.g., in the case of network traffic) by the system on which it is executing."""^^xsd:string ;
11601167
skos:prefLabel "compromises-data-integrity"^^xsd:string ;
11611168
.
11621169

1163-
gist:_MalwareCapability_Compromises-System-Availability
1170+
gist:_MalwareCapability_compromises-system-availability
11641171
a gist:MalwareCapability ;
11651172
skos:definition """STIX 2.1 description:
11661173
Indicates that the malware instance or family is able to consume system resources for its malicious purposes, such as password cracking or participating in a DDoS botnet, thereby compromising the availability of the local system and/or one or more remote systems."""^^xsd:string ;
11671174
skos:prefLabel "compromises-system-availability"^^xsd:string ;
11681175
.
11691176

1170-
gist:_MalwareCapability_Controls-Local-Machine
1177+
gist:_MalwareCapability_controls-local-machine
11711178
a gist:MalwareCapability ;
11721179
skos:definition """STIX 2.1 description:
11731180
Indicates that the malware instance or family is able to control the machine on which it is executing (e.g., RATs)."""^^xsd:string ;
11741181
skos:prefLabel "controls-local-machine"^^xsd:string ;
11751182
.
11761183

1177-
gist:_MalwareCapability_Degrades-Security-Software
1184+
gist:_MalwareCapability_degrades-security-software
11781185
a gist:MalwareCapability ;
11791186
skos:definition """STIX 2.1 description:
11801187
Indicates that the malware instance or family is able to bypass or disable security programs or operating system security features on a system (including mobile devices), either by stopping them from executing or by making changes to their code or configuration parameters. For example, malware that blocks the local machine from accessing the websites of security vendors."""^^xsd:string ;
11811188
skos:prefLabel "degrades-security-software"^^xsd:string ;
11821189
.
11831190

1184-
gist:_MalwareCapability_Degrades-System-Updates
1191+
gist:_MalwareCapability_degrades-system-updates
11851192
a gist:MalwareCapability ;
11861193
skos:definition """STIX 2.1 description:
11871194
Indicates that the malware instance or family is able to disable the downloading and installation of system updates and patches."""^^xsd:string ;
11881195
skos:prefLabel "degrades-system-updates"^^xsd:string ;
11891196
.
11901197

1191-
gist:_MalwareCapability_Determines-C2-Server
1198+
gist:_MalwareCapability_determines-c2-server
11921199
a gist:MalwareCapability ;
11931200
skos:definition """STIX 2.1 description:
11941201
Indicates that the malware instance or family is able to identify one or more command and control (C2) servers with which to communicate (e.g., DGA)."""^^xsd:string ;
11951202
skos:prefLabel "determines-c2-server"^^xsd:string ;
11961203
.
11971204

1198-
gist:_MalwareCapability_Evades-Av
1205+
gist:_MalwareCapability_emails-spam
1206+
a gist:MalwareCapability ;
1207+
skos:definition """STIX 2.1 description:
1208+
Indicates that the malware instance or family is able to send spam email messages."""^^xsd:string ;
1209+
skos:prefLabel "emails-spam"^^xsd:string ;
1210+
.
1211+
1212+
gist:_MalwareCapability_escalates-privileges
1213+
a gist:MalwareCapability ;
1214+
skos:definition """STIX 2.1 description:
1215+
Indicates that the malware instance or family is able to escalate the privileges under which it is executing."""^^xsd:string ;
1216+
skos:prefLabel "escalates-privileges"^^xsd:string ;
1217+
.
1218+
1219+
gist:_MalwareCapability_evades-av
11991220
a gist:MalwareCapability ;
12001221
skos:definition """STIX 2.1 description:
12011222
Indicates that the malware instance or family is able to evade detection by antivirus tools."""^^xsd:string ;
12021223
skos:prefLabel "evades-av"^^xsd:string ;
12031224
.
12041225

1205-
gist:_MalwareCapability_Exfiltrates-Data
1226+
gist:_MalwareCapability_exfiltrates-data
12061227
a gist:MalwareCapability ;
12071228
skos:definition """STIX 2.1 description:
12081229
Indicates that the malware instance or family is able to gather, prepare, (possibly obfuscate) data and transmit it to exfiltration points."""^^xsd:string ;
12091230
skos:prefLabel "exfiltrates-data"^^xsd:string ;
12101231
.
12111232

1212-
gist:_MalwareCapability_Fingerprints-Host
1233+
gist:_MalwareCapability_fingerprints-host
12131234
a gist:MalwareCapability ;
12141235
skos:definition """STIX 2.1 description:
12151236
Indicates that the malware instance or family is able to fingerprint or probe the configuration of the host system on which it is executing for the purpose of altering its behavior based on this environment."""^^xsd:string ;
12161237
skos:prefLabel "fingerprints-host"^^xsd:string ;
12171238
.
12181239

1219-
gist:_MalwareCapability_Hides-Artifacts
1240+
gist:_MalwareCapability_hides-artifacts
12201241
a gist:MalwareCapability ;
12211242
skos:definition """STIX 2.1 description:
12221243
Indicates that the malware instance or family is able to hide its artifacts, such as files and open ports."""^^xsd:string ;
12231244
skos:prefLabel "hides-artifacts"^^xsd:string ;
12241245
.
12251246

1226-
gist:_MalwareCapability_Infects-Files
1247+
gist:_MalwareCapability_hides-executing-code
1248+
a gist:MalwareCapability ;
1249+
skos:definition """STIX 2.1 description:
1250+
Indicates that the malware instance or family is able to hide its code by compromising the bootloader, kernel modules, hypervisor, etc."""^^xsd:string ;
1251+
skos:prefLabel "hides-executing-code"^^xsd:string ;
1252+
.
1253+
1254+
gist:_MalwareCapability_infects-files
12271255
a gist:MalwareCapability ;
12281256
skos:definition """STIX 2.1 description:
12291257
Indicates that the malware instance or family is able to infect one or more files on the system on which it executes. For example, malware which injects a malicious payload into all PDFs on a host as a means of propagation."""^^xsd:string ;
12301258
skos:prefLabel "infects-files"^^xsd:string ;
12311259
.
12321260

1233-
gist:_MalwareCapability_Infects-Remote-Machines
1261+
gist:_MalwareCapability_infects-remote-machines
12341262
a gist:MalwareCapability ;
12351263
skos:definition """STIX 2.1 description:
12361264
Indicates that the malware instance or family is able to self-propagate to a remote machine or infect a remote machine with malware that is different than itself."""^^xsd:string ;
12371265
skos:prefLabel "infects-remote-machines"^^xsd:string ;
12381266
.
12391267

1240-
gist:_MalwareCapability_Installs-Other-Components
1268+
gist:_MalwareCapability_installs-other-components
12411269
a gist:MalwareCapability ;
12421270
skos:definition """STIX 2.1 description:
12431271
Indicates that the malware instance or family is able to install additional components. This encompasses the dropping/downloading of other malicious components such as libraries, other malware, and tools."""^^xsd:string ;
12441272
skos:prefLabel "installs-other-components"^^xsd:string ;
12451273
.
12461274

1247-
gist:_MalwareCapability_Persists-After-System-Reboot
1275+
gist:_MalwareCapability_persists-after-system-reboot
12481276
a gist:MalwareCapability ;
12491277
skos:definition """STIX 2.1 description:
12501278
Indicates that the malware instance or family is able to continue executing after the reboot of the system on which it is resident."""^^xsd:string ;
12511279
skos:prefLabel "persists-after-system-reboot"^^xsd:string ;
12521280
.
12531281

1254-
gist:_MalwareCapability_Prevents-Artifact-Access
1282+
gist:_MalwareCapability_prevents-artifact-access
12551283
a gist:MalwareCapability ;
12561284
skos:definition """STIX 2.1 description:
12571285
Indicates that the malware instance or family is able to prevent its artifacts (e.g., files, registry keys, etc.) from being accessed."""^^xsd:string ;
12581286
skos:prefLabel "prevents-artifact-access"^^xsd:string ;
12591287
.
12601288

1261-
gist:_MalwareCapability_Prevents-Artifact-Deletion
1289+
gist:_MalwareCapability_prevents-artifact-deletion
12621290
a gist:MalwareCapability ;
12631291
skos:definition """STIX 2.1 description:
12641292
Indicates that the malware instance or family is able to prevent its artifacts (e.g., files, registry keys, etc.) from being deleted."""^^xsd:string ;
12651293
skos:prefLabel "prevents-artifact-deletion"^^xsd:string ;
12661294
.
12671295

1268-
gist:_MalwareCapability_Probes-Network-Environment
1296+
gist:_MalwareCapability_probes-network-environment
12691297
a gist:MalwareCapability ;
12701298
skos:definition """STIX 2.1 description:
12711299
Indicates that the malware instance or family is able to probe the properties of its network environment, e.g. to determine whether it funnels traffic through a proxy."""^^xsd:string ;
12721300
skos:prefLabel "probes-network-environment"^^xsd:string ;
12731301
.
12741302

1275-
gist:_MalwareCapability_Self-Modifies
1303+
gist:_MalwareCapability_self-modifies
12761304
a gist:MalwareCapability ;
12771305
skos:definition """STIX 2.1 description:
12781306
Indicates that the malware instance or family is able to modify itself."""^^xsd:string ;
12791307
skos:prefLabel "self-modifies"^^xsd:string ;
12801308
.
12811309

1282-
gist:_MalwareCapability_Steals-Authentication-Credentials
1310+
gist:_MalwareCapability_steals-authentication-credentials
12831311
a gist:MalwareCapability ;
12841312
skos:definition """STIX 2.1 description:
12851313
Indicates that the malware instance is able to steal authentication credentials."""^^xsd:string ;
12861314
skos:prefLabel "steals-authentication-credentials"^^xsd:string ;
12871315
.
12881316

1289-
gist:_MalwareCapability_Violates-System-Operational-Integrity
1317+
gist:_MalwareCapability_violates-system-operational-integrity
12901318
a gist:MalwareCapability ;
12911319
skos:definition """STIX 2.1 description:
12921320
Indicates that the malware instance or family is able to compromise the operational integrity of the system on which it is executing and/or one or more remote systems, e.g., by causing them to operate beyond their set of specified operational parameters. For example, malware that causes the CPU fan on the machine that it is executing to spin at a higher than normal speed."""^^xsd:string ;
12931321
skos:prefLabel "violates-system-operational-integrity"^^xsd:string ;
12941322
.
12951323

1296-
gist:_MalwareCapability_cleans-traces-of-infection
1297-
a gist:MalwareCapability ;
1298-
skos:definition """STIX 2.1 description:
1299-
Indicates that the malware instance or family is able to clean traces of its infection (e.g., file system artifacts) from a system."""^^xsd:string ;
1300-
skos:prefLabel "cleans-traces-of-infection"^^xsd:string ;
1301-
.
1302-
1303-
gist:_MalwareCapability_eEails-Spam
1304-
a gist:MalwareCapability ;
1305-
skos:definition """STIX 2.1 description:
1306-
Indicates that the malware instance or family is able to send spam email messages."""^^xsd:string ;
1307-
skos:prefLabel "emails-spam"^^xsd:string ;
1308-
.
1309-
1310-
gist:_MalwareCapability_escalates-privileges
1311-
a gist:MalwareCapability ;
1312-
skos:definition """STIX 2.1 description:
1313-
Indicates that the malware instance or family is able to escalate the privileges under which it is executing."""^^xsd:string ;
1314-
skos:prefLabel "escalates-privileges"^^xsd:string ;
1315-
.
1316-
1317-
gist:_MalwareCapability_hides-executing-code
1318-
a gist:MalwareCapability ;
1319-
skos:definition """STIX 2.1 description:
1320-
Indicates that the malware instance or family is able to hide its code by compromising the bootloader, kernel modules, hypervisor, etc."""^^xsd:string ;
1321-
skos:prefLabel "hides-executing-code"^^xsd:string ;
1322-
.
1323-
13241324
gist:_MalwareResult_benign
13251325
a gist:MalwareResult ;
13261326
skos:definition """STIX 2.1 description:

0 commit comments

Comments
 (0)