Skip to content

Commit a912ba1

Browse files
committed
adding vocabulary Categories
1 parent 0304014 commit a912ba1

File tree

1 file changed

+168
-1
lines changed

1 file changed

+168
-1
lines changed

ontologies/gistCyber.ttl

Lines changed: 168 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
# imports: https://w3id.org/semanticarts/ontology/gistBFO
22
# imports: https://w3id.org/semanticarts/ontology/gistComputing
3+
# imports: https://w3id.org/semanticarts/ontology/vocabulary
34

45
@prefix : <https://ontologies.semanticarts.com/o/gistCyber#> .
56
@prefix gist: <https://w3id.org/semanticarts/ns/ontology/gist/> .
@@ -15,20 +16,36 @@
1516
a owl:Ontology ;
1617
owl:imports
1718
<https://w3id.org/semanticarts/ontology/gistBFO> ,
18-
<https://w3id.org/semanticarts/ontology/gistComputing>
19+
<https://w3id.org/semanticarts/ontology/gistComputing> ,
20+
<https://w3id.org/semanticarts/ontology/vocabulary>
1921
;
2022
owl:versionIRI <https://ontologies.semanticarts.com/o/gistCyberX.x.x> ;
2123
skos:definition "Sub-gist for cybersecurity."^^xsd:string ;
2224
skos:prefLabel "gistCyber"^^xsd:string ;
2325
.
2426

27+
gist:AccountTypeVocabulary
28+
a owl:Class ;
29+
rdfs:subClassOf gist:Category ;
30+
.
31+
32+
gist:AttackMotivationVocabulary
33+
a owl:Class ;
34+
rdfs:subClassOf gist:Category ;
35+
.
36+
2537
gist:AttackPattern
2638
a owl:Class ;
2739
rdfs:subClassOf gist:TaskTemplate ;
2840
rdfs:label "Attack Pattern"^^xsd:string ;
2941
rdfs:comment 'Attack Patterns are a type of TTP that describe ways that adversaries attempt to compromise targets. Attack Patterns are used to help categorize attacks, generalize specific attacks to the patterns that they follow, and provide detailed information about how attacks are performed. An example of an attack pattern is "spear phishing": a common type of attack where an attacker sends a carefully crafted e-mail message to a party with the intent of getting them to click a link or open an attachment to deliver malware. Attack Patterns can also be more specific; spear phishing as practiced by a particular threat actor (e.g., they might generally say that the target won a contest) can also be an Attack Pattern. The Attack Pattern SDO contains textual descriptions of the pattern along with references to externally-defined taxonomies of attacks such as CAPEC [CAPEC].'^^xsd:string ;
3042
.
3143

44+
gist:AttackResourceLevelVocabulary
45+
a owl:Class ;
46+
rdfs:subClassOf gist:Category ;
47+
.
48+
3249
gist:Campaign
3350
a owl:Class ;
3451
rdfs:subClassOf gist:TaskTemplate ;
@@ -48,13 +65,33 @@ gist:CourseOfAction
4865
rdfs:comment "Note: The Course of Action object in STIX 2.1 is a stub. It is included to support basic use cases (such as sharing prose courses of action) but does not support the ability to represent automated courses of action or contain properties to represent metadata about courses of action. Future STIX 2 releases will expand it to include these capabilities. A Course of Action is an action taken either to prevent an attack or to respond to an attack that is in progress. It may describe technical, automatable responses (applying patches, reconfiguring firewalls) but can also describe higher level actions like employee training or policy changes. For example, a course of action to mitigate a vulnerability could describe applying the patch that fixes it. The Course of Action SDO contains a textual description of the action; a reserved action property also serves as a placeholder for future inclusion of machine automatable courses of action."^^xsd:string ;
4966
.
5067

68+
gist:EncryptionAlgorithmEnum
69+
a owl:Class ;
70+
rdfs:subClassOf gist:Category ;
71+
.
72+
73+
gist:ExtensionTypesEnum
74+
a owl:Class ;
75+
rdfs:subClassOf gist:Category ;
76+
.
77+
5178
gist:Grouping
5279
a owl:Class ;
5380
rdfs:subClassOf gist:Collection ;
5481
rdfs:label "Grouping"^^xsd:string ;
5582
rdfs:comment "STIX Definition: A Grouping object explicitly asserts that the referenced STIX Objects have a shared context, unlike a STIX Bundle (which explicitly conveys no context). A Grouping object should not be confused with an intelligence product, which should be conveyed via a STIX Report. A STIX Grouping object might represent a set of data that, in time, given sufficient analysis, would mature to convey an incident or threat report as a STIX Report object. For example, a Grouping could be used to characterize an ongoing investigation into a security event or incident. A Grouping object could also be used to assert that the referenced STIX Objects are related to an ongoing analysis process, such as when a threat analyst is collaborating with others in their trust community to examine a series of Campaigns and Indicators. The Grouping SDO contains a list of references to SDOs, SCOs, SROs, and SMOs, along with an explicit statement of the context shared by the content, a textual description, and the name of the grouping."^^xsd:string ;
5683
.
5784

85+
gist:GroupingContextVocabulary
86+
a owl:Class ;
87+
rdfs:subClassOf gist:Category ;
88+
.
89+
90+
gist:HashingAlgorithmVocabulary
91+
a owl:Class ;
92+
rdfs:subClassOf gist:Category ;
93+
.
94+
5895
gist:Identity
5996
a owl:Class ;
6097
rdfs:label "Identity"^^xsd:string ;
@@ -74,6 +111,16 @@ gist:Identity
74111
] ;
75112
.
76113

114+
gist:IdentityClassVocabulary
115+
a owl:Class ;
116+
rdfs:subClassOf gist:Category ;
117+
.
118+
119+
gist:ImplementationLanguageVocabulary
120+
a owl:Class ;
121+
rdfs:subClassOf gist:Category ;
122+
.
123+
77124
gist:Incident
78125
a owl:Class ;
79126
rdfs:subClassOf gist:Event ;
@@ -88,10 +135,25 @@ gist:Indicator
88135
rdfs:comment "STIX Definition: Indicators contain a pattern that can be used to detect suspicious or malicious cyber activity. For example, an Indicator may be used to represent a set of malicious domains and use the STIX Patterning Language (see section 9) to specify these domains. The Indicator SDO contains a simple textual description, the Kill Chain Phases that it detects behavior in, a time window for when the Indicator is valid or useful, and a required pattern property to capture a structured detection pattern. Conforming STIX implementations MUST support the STIX Patterning Language as defined in section 9. Relationships from the Indicator can describe the malicious or suspicious behavior that it directly detects (Malware, Tool, and Attack Pattern). In addition, it may also imply the presence of a Campaigns, Intrusion Sets, and Threat Actors, etc."^^xsd:string ;
89136
.
90137

138+
gist:IndicatorTypeVocabulary
139+
a owl:Class ;
140+
rdfs:subClassOf gist:Category ;
141+
.
142+
143+
gist:IndustrySectorVocabulary
144+
a owl:Class ;
145+
rdfs:subClassOf gist:Category ;
146+
.
147+
91148
gist:Infrastructure
92149
a owl:Class ;
93150
.
94151

152+
gist:InfrastructureTypeVocabulary
153+
a owl:Class ;
154+
rdfs:subClassOf gist:Category ;
155+
.
156+
95157
gist:IntrusionSet
96158
a owl:Class ;
97159
rdfs:subClassOf gist:TaskTemplate ;
@@ -117,6 +179,31 @@ gist:MalwareAnalysis
117179
a owl:Class ;
118180
.
119181

182+
gist:MalwareCapabilitiesVocabulary
183+
a owl:Class ;
184+
rdfs:subClassOf gist:Category ;
185+
.
186+
187+
gist:MalwareResultVocabulary
188+
a owl:Class ;
189+
rdfs:subClassOf gist:Category ;
190+
.
191+
192+
gist:MalwareTypeVocabulary
193+
a owl:Class ;
194+
rdfs:subClassOf gist:Category ;
195+
.
196+
197+
gist:NetworkSocketAddressFamilyEnum
198+
a owl:Class ;
199+
rdfs:subClassOf gist:Category ;
200+
.
201+
202+
gist:NetworkSocketTypeEnum
203+
a owl:Class ;
204+
rdfs:subClassOf gist:Category ;
205+
.
206+
120207
gist:Note
121208
a owl:Class ;
122209
.
@@ -129,15 +216,40 @@ gist:Opinion
129216
a owl:Class ;
130217
.
131218

219+
gist:OpinionEnum
220+
a owl:Class ;
221+
rdfs:subClassOf gist:Category ;
222+
.
223+
224+
gist:PatternTypeVocabulary
225+
a owl:Class ;
226+
rdfs:subClassOf gist:Category ;
227+
.
228+
229+
gist:ProcessorArchitectureVocabulary
230+
a owl:Class ;
231+
rdfs:subClassOf gist:Category ;
232+
.
233+
132234
gist:ProtocolVulnerability
133235
a owl:Class ;
134236
rdfs:subClassOf gist:Vulnerabity ;
135237
.
136238

239+
gist:RegionVocabulary
240+
a owl:Class ;
241+
rdfs:subClassOf gist:Category ;
242+
.
243+
137244
gist:Report
138245
a owl:Class ;
139246
.
140247

248+
gist:ReportTypeVocabulary
249+
a owl:Class ;
250+
rdfs:subClassOf gist:Category ;
251+
.
252+
141253
gist:SoftwareVulnerability
142254
a owl:Class ;
143255
rdfs:subClassOf gist:Defect ;
@@ -152,15 +264,70 @@ gist:ThreatActor
152264
rdfs:comment "Threat Actors are actual individuals, groups, or organizations believed to be operating with malicious intent. A Threat Actor is not an Intrusion Set but may support or be affiliated with various Intrusion Sets, groups, or organizations over time. \\n\\nThreat Actors leverage their resources, and possibly the resources of an Intrusion Set, to conduct attacks and run Campaigns against targets. \\n\\nThreat Actors can be characterized by their motives, capabilities, goals, sophistication level, past activities, resources they have access to, and their role in the organization."^^xsd:string ;
153265
.
154266

267+
gist:ThreatActorRoleVocabulary
268+
a owl:Class ;
269+
rdfs:subClassOf gist:Category ;
270+
.
271+
272+
gist:ThreatActorSophisticationVocabulary
273+
a owl:Class ;
274+
rdfs:subClassOf gist:Category ;
275+
.
276+
277+
gist:ThreatActorTypeVocabulary
278+
a owl:Class ;
279+
rdfs:subClassOf gist:Category ;
280+
.
281+
155282
gist:Tool
156283
a owl:Class ;
157284
rdfs:subClassOf gist:Software ;
158285
rdfs:label "Tool"^^xsd:string ;
159286
rdfs:comment "STIX Definition:Tools are legitimate software that can be used by threat actors to perform attacks. Knowing how and when threat actors use such tools can be important for understanding how campaigns are executed. Unlike malware, these tools or software packages are often found on a system and have legitimate purposes for power users, system administrators, network administrators, or even normal users. Remote access tools (e.g., RDP) and network scanning tools (e.g., Nmap) are examples of Tools that may be used by a Threat Actor during an attack. \\n\\nThe Tool SDO characterizes the properties of these software tools and can be used as a basis for making an assertion about how a Threat Actor uses them during an attack. It contains properties to name and describe the tool, a list of Kill Chain Phases the tool can be used to carry out, and the version of the tool. \\n\\nThis SDO MUST NOT be used to characterize malware. Further, Tool MUST NOT be used to characterize tools used as part of a course of action in response to an attack."^^xsd:string ;
160287
.
161288

289+
gist:ToolTypeVocabulary
290+
a owl:Class ;
291+
rdfs:subClassOf gist:Category ;
292+
.
293+
162294
gist:Vulnerabity
163295
a owl:Class ;
164296
rdfs:label "Vulnerability"^^xsd:string ;
165297
.
166298

299+
gist:WindowsIntegrityLevelEnum
300+
a owl:Class ;
301+
rdfs:subClassOf gist:Category ;
302+
.
303+
304+
gist:WindowsPEBinaryEnum
305+
a owl:Class ;
306+
rdfs:subClassOf gist:Category ;
307+
.
308+
309+
gist:WindowsPEBinaryVocabulary
310+
a owl:Class ;
311+
rdfs:subClassOf gist:Category ;
312+
.
313+
314+
gist:WindowsRegistryDatatypeEnum
315+
a owl:Class ;
316+
rdfs:subClassOf gist:Category ;
317+
.
318+
319+
gist:WindowsServiceStartTypeEnum
320+
a owl:Class ;
321+
rdfs:subClassOf gist:Category ;
322+
.
323+
324+
gist:WindowsServiceStatusEnum
325+
a owl:Class ;
326+
rdfs:subClassOf gist:Category ;
327+
.
328+
329+
gist:WindowsServiceTypeEnum
330+
a owl:Class ;
331+
rdfs:subClassOf gist:Category ;
332+
.
333+

0 commit comments

Comments
 (0)