IRI: http://purl.org/cyber/stix#Adversary
IRI: http://purl.org/cyber/stix#Artifact
IRI: http://purl.org/cyber/stix#AttackPattern
IRI: http://purl.org/cyber/stix#attack-pattern
IRI: http://purl.org/cyber/stix#AutonomousSystem
IRI: http://purl.org/cyber/stix#Campaign
IRI: http://purl.org/cyber/stix#CourseOfAction
IRI: http://purl.org/cyber/stix#CrimeSyndicate
IRI: http://purl.org/cyber/stix#Criminal
IRI: http://purl.org/cyber/stix#DefinitionObject
IRI: http://purl.org/cyber/stix#DomainName
IRI: http://purl.org/cyber/stix#EmailAddr
IRI: http://purl.org/cyber/stix#EmailMessage
IRI: http://purl.org/cyber/stix#ExternalReference
IRI: http://purl.org/cyber/stix#File
IRI: http://purl.org/cyber/stix#FileName
IRI: http://purl.org/cyber/stix#FilePath
IRI: http://purl.org/cyber/stix#GranularMarking
IRI: http://purl.org/cyber/stix#Identity
IRI: http://purl.org/cyber/stix#Indicator
IRI: http://purl.org/cyber/stix#Individual
IRI: http://purl.org/cyber/stix#IntrusionSet
IRI: http://purl.org/cyber/stix#IpAddr
IRI: http://purl.org/cyber/stix#Ipv4Addr
IRI: http://purl.org/cyber/stix#Ipv6Addr
IRI: http://purl.org/cyber/stix#KillChainPhase
IRI: http://purl.org/cyber/stix#LocalFile
IRI: http://purl.org/cyber/stix#macAddr
IRI: http://purl.org/cyber/stix#Malware
IRI: http://purl.org/cyber/stix#MarkingDefinition
IRI: http://purl.org/cyber/stix#Mutex
IRI: http://purl.org/cyber/stix#NationState
IRI: http://purl.org/cyber/stix#NetworkTraffic
IRI: http://purl.org/cyber/stix#Note
IRI: http://purl.org/cyber/stix#ObservedData
IRI: http://purl.org/cyber/stix#Opinion
IRI: http://purl.org/cyber/stix#opinion
IRI: http://purl.org/cyber/stix#Organization
IRI: http://purl.org/cyber/stix#Port
IRI: http://purl.org/cyber/stix#Process
IRI: http://purl.org/cyber/stix#Protocol
IRI: http://purl.org/cyber/stix#Relationship
IRI: http://purl.org/cyber/stix#Report
IRI: http://purl.org/cyber/stix#Sighting
IRI: http://purl.org/cyber/stix#Software
IRI: http://purl.org/cyber/stix#Spy
IRI: http://purl.org/cyber/stix#StixDomainObject
IRI: http://purl.org/cyber/stix#StixObservables
IRI: http://purl.org/cyber/stix#TTP
IRI: http://purl.org/cyber/stix#Terrorist
IRI: http://purl.org/cyber/stix#ThreatActor
IRI: http://purl.org/cyber/stix#Tool
IRI: http://purl.org/cyber/stix#URL
IRI: http://purl.org/cyber/stix#URLPath
IRI: http://purl.org/cyber/stix#UserAccount
IRI: http://purl.org/cyber/stix#UserAgent
IRI: http://purl.org/cyber/stix#Vulnerability
IRI: http://purl.org/cyber/stix#WindowsRegistryKey
IRI: http://purl.org/cyber/stix#X509Certificate
IRI: http://purl.org/cyber/stix#attributedTo
IRI: http://purl.org/cyber/stix#attributionOf
IRI: http://purl.org/cyber/stix#authorOf
IRI: http://purl.org/cyber/stix#authoredBy
IRI: http://purl.org/cyber/stix#belongsTo
IRI: http://purl.org/cyber/stix#createdBy
IRI: http://purl.org/cyber/stix#creatorOf
IRI: http://purl.org/cyber/stix#definition
IRI: http://purl.org/cyber/stix#derivedFrom
IRI: http://purl.org/cyber/stix#duplicateOf
has characteristics : transitive
IRI: http://purl.org/cyber/stix#exploitedBy
IRI: http://purl.org/cyber/stix#exploits
IRI: http://purl.org/cyber/stix#ExternalReference
IRI: http://purl.org/cyber/stix#externalReferenceOf
IRI: http://purl.org/cyber/stix#granularMarkingOf
IRI: http://purl.org/cyber/stix#hasGranularMarking
IRI: http://purl.org/cyber/stix#hasPhase
IRI: http://purl.org/cyber/stix#impersonates
IRI: http://purl.org/cyber/stix#indicatedBy
IRI: http://purl.org/cyber/stix#indicates
IRI: http://purl.org/cyber/stix#killChainPhase
IRI: http://purl.org/cyber/stix#killChainPhaseOf
IRI: http://purl.org/cyber/stix#mitigatedBy
IRI: http://purl.org/cyber/stix#mitigates
IRI: http://purl.org/cyber/stix#object
IRI: http://purl.org/cyber/stix#objectMarking
IRI: http://purl.org/cyber/stix#opinionAbout
IRI: http://purl.org/cyber/stix#owner
IRI: http://purl.org/cyber/stix#ownerOf
IRI: http://purl.org/cyber/stix#phaseOf
IRI: http://purl.org/cyber/stix#provenance
IRI: http://purl.org/cyber/stix#relatedTo
has characteristics : transitive
IRI: http://purl.org/cyber/stix#sightedBy
IRI: http://purl.org/cyber/stix#sightingOf
IRI: http://purl.org/cyber/stix#source
IRI: http://purl.org/cyber/stix#target
IRI: http://purl.org/cyber/stix#targetedBy
IRI: http://purl.org/cyber/stix#targets
IRI: http://purl.org/cyber/stix#variant
IRI: http://purl.org/cyber/stix#alias
IRI: http://purl.org/cyber/stix#body
IRI: http://purl.org/cyber/stix#commonDataProperty
IRI: http://purl.org/cyber/stix#confidence
IRI: http://purl.org/cyber/stix#country
IRI: http://purl.org/cyber/stix#cpe
IRI: http://purl.org/cyber/stix#created
IRI: http://purl.org/cyber/stix#definitionType
IRI: http://purl.org/cyber/stix#description
IRI: http://purl.org/cyber/stix#emailProperty
IRI: http://purl.org/cyber/stix#goals
IRI: http://purl.org/cyber/stix#id
IRI: http://purl.org/cyber/stix#identityClass
IRI: http://purl.org/cyber/stix#isMultipart
IRI: http://purl.org/cyber/stix#killChainName
IRI: http://purl.org/cyber/stix#label
IRI: http://purl.org/cyber/stix#language
IRI: http://purl.org/cyber/stix#md5
has characteristics : functional
IRI: http://purl.org/cyber/stix#mimeType
IRI: http://purl.org/cyber/stix#modified
IRI: http://purl.org/cyber/stix#name
IRI: http://purl.org/cyber/stix#opinion
IRI: http://purl.org/cyber/stix#path
IRI: http://purl.org/cyber/stix#payloadBin
IRI: http://purl.org/cyber/stix#phaseName
IRI: http://purl.org/cyber/stix#platform
IRI: http://purl.org/cyber/stix#published
IRI: http://purl.org/cyber/stix#relationshipType
IRI: http://purl.org/cyber/stix#revoked
IRI: http://purl.org/cyber/stix#sector
IRI: http://purl.org/cyber/stix#sha-1
has characteristics : functional
IRI: http://purl.org/cyber/stix#sha-224
has characteristics : functional
IRI: http://purl.org/cyber/stix#sha-256
has characteristics : functional
IRI: http://purl.org/cyber/stix#sha-384
has characteristics : functional
IRI: http://purl.org/cyber/stix#sha-512
has characteristics : functional
IRI: http://purl.org/cyber/stix#size
IRI: http://purl.org/cyber/stix#skillDescription
IRI: http://purl.org/cyber/stix#skillLevel
IRI: http://purl.org/cyber/stix#specVersion
IRI: http://purl.org/cyber/stix#statement
IRI: http://purl.org/cyber/stix#stixDataProperty
IRI: http://purl.org/cyber/stix#stixName
IRI: http://purl.org/cyber/stix#subject
IRI: http://purl.org/cyber/stix#tlp
IRI: http://purl.org/cyber/stix#type
IRI: http://purl.org/cyber/stix#URL
IRI: http://purl.org/cyber/stix#user_id
IRI: http://purl.org/cyber/stix#value
IRI: http://purl.org/cyber/stix#vendor
IRI: http://purl.org/cyber/stix#version
IRI: http://purl.org/cyber/stix#x_mitre_alias
IRI: http://purl.org/cyber/stix#x-mitre-contributor
IRI: http://purl.org/cyber/stix#x_mitre_data_source
IRI: http://purl.org/cyber/stix#x_mitre_defense_bypassed
IRI: http://purl.org/cyber/stix#x_mitre_deprecated
IRI: http://purl.org/cyber/stix#x_mitre_effective_permission
IRI: http://purl.org/cyber/stix#x_mitre_network_requirements
IRI: http://purl.org/cyber/stix#x_mitre_permissions_required
IRI: http://purl.org/cyber/stix#x_mitre_platform
IRI: http://purl.org/cyber/stix#x-mitre-property
IRI: http://purl.org/cyber/stix#x_mitre_remote_support
IRI: http://purl.org/cyber/stix#x_mitre_system_requirement
IRI: http://purl.org/cyber/stix#x_mitre_tactic_type
IRI: http://purl.org/cyber/stix#x_resources_required
This HTML document was obtained by processing the OWL ontology source code through LODE, Live OWL Documentation Environment, developed by Silvio Peroni .