PAPO: A Phishing Attack Process Ontology

PAPO ontologically unpacks our characterization of the phishing attack process as a complex event wherein: (1) a phisher impersonates a reputable agent, (2) exploits the target's trust in this agent, (3) aims to trick the target into taking the attacker's desired action, (4) offering supposedly plausible reasons for this behavior.

Table of Contents

  1. General Information
  2. Alphabetical Index of Terms
  3. Classes
  4. Object Properties
  5. Datatype Properties

1. General Information

Namespace

http://papo.com#

Prefixes

http://papo.com#
gufo http://purl.org/nemo/gufo#
rdf http://www.w3.org/1999/02/22-rdf-syntax-ns#
rdfs http://www.w3.org/2000/01/rdf-schema#
owl http://www.w3.org/2002/07/owl#
xsd http://www.w3.org/2001/XMLSchema#

2. Alphabetical Index of Terms

Classes: | Agent | Belief | Complacency | Curiosity | DesireToPlease | Distraction | Email | Fear | Fraud | FulfillmentOfPhishersRequest | Greed | HookWebpage | Hurry | Ignorance | ImpersonatedReputableAgent | IndividualPhisher | Influence | Innocence | Intention | Loneliness | LureEmail | LureMessage | LureMessageArrival | LureMessageDispatch | LureMessagePerception | MentalAttitude | Organization | Person | Phisher | PhisherOrganization | PhishingAttackCapability | PhishingAttackExecution | PhishingAttackPlanning | PhishingAttackPreparation | PhishingAttackProcess | PhishingEnabler | PhishingParticipantTrustee | PhishingPlan | PhishingTarget | PostAttackPhase | TargetAsset | TargetFragility | TargetTrust | TrustBasedAction | Urgency | Vulnerability | VulnerabilityCondition | Webpage

Object Properties: | acquiredThrough | aimsToCatch | aimsToEnable | aimsToImpersonate | aimsToTrick | beliefInheresInPhishingTarget | carriedOut | considers | createdBy | dependsOn | designedBy | discusses | dispatchedTo | employs | enabled | executed | experienced | facilitates | forawardsTo | fraudHistoricallyDependsOnPhishingAttackExecution | fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception | impersonated | influences | intentionInheresInPhishingTarget | involvedIn | lureMessageArrivalHistoricallyDependsOnLureMessageDispatch | lureMessageParticipatedInPhishingAttackExecution | lureMessagePerceptionHistoricallyDependsOnLureMessageArrival | made | phishingAttackCapabilityInheresInPhisher | phishingAttackCapabilityManifestedInPhishingAttackExecution | phishingAttackExecutionHasFulfillmentOfPhishersRequest | phishingAttackExecutionHasLureMessageArrival | phishingAttackExecutionHasLureMessageDispatch | phishingAttackExecutionHasLureMessagePerception | phishingAttackExecutionHistoricallyDependsOnPhishingAttackPreparation | phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning | phishingAttackProcessHasFraud | phishingAttackProcessHasPhishingAttackExecution | phishingAttackProcessHasPhishingAttackPlanning | phishingAttackProcessHasPhishingAttackPreparation | phishingAttackProcessHasPostAttackPhase | phishingEnablerParticipatedInPhishingAttackExecution | phishingTargetParticipatedInPhishingAttackExecution | postAttackPhaseHistoricallyDependsOnPhishingAttackExecution | requests | selects | targetAssetParticipatedInFulfillmentOfPhishersRequest | targetFragilityInheresInPhishingTarget | targetFragilityManifestedInFulfillmentOfPhishersRequest | targetTrustHasBelief | targetTrustHasIntention | targetTrustInheresInPhishingTarget | targetTrustManifestedInTrustBasedAction | usedIn

Dataatype Properties: | asset_name | asset_type | attachments_count | body | date_of_birth | gender | highest_education_level | hook_impersonated_agent | impersonated_agent_name | importance_level | lure_email_campaign | lure_impersonated_agent | nationality | online | organization_name | person_name | received_at | recipient | sender | sent_at | status | subject | webpage_url | weight

3. Classes

Agent

"In UFO-C, there is a distinction between Agentive and Non-agentive substantial particulars: respectively, Agents and Objects. Agents can be physical (e.g., a person) or social (e.g., an organization, a society). Objects can also be further categorized in physical and social objects.Physical objects include a book, a tree, a car. Social objects include money, language and Normative Descriptions. A normative description defines one or more rules or norms recognized by at least one social agent and that can define nominal universals such as social moment universals (e.g., social commitment types), social objects (the crown of the king of Spain) and social roles such as president, prime minister, PhD candidate or pedestrian. Examples of normative descriptions include the Italian Constitution, the University of Twente PhD program regulations, but also a set of directives on how to perform some actions within an organization (a description of a plan). Agents are substantials that can bear special kinds of moments named Intentional Moments. Intentionality should be understood in a much broader context than the notion of “intending something”, but as the capacity of some proper-ties of certain individuals to refer to possible situations of reality. Guizzardi, G., de Almeida Falbo, R. and Guizzardi, R.S., 2008, February. Grounding software domain ontologies in the unified foundational ontology (ufo): the case of the ode software process ontology. In CIbSE (pp. 127-140)."@e

label: Agent"@e
identifier: http://papo.com#Agent
stereotype: gufo:Category
supertypes: gufo:FunctionalComplex
subtypes: :Phisher :Person :ImpersonatedReputableAgent :Organization
in range of: :aimsToImpersonate

Belief

In UFO-C, a belief is an Intentional Moment that inheres in an Agent. It can be justified or frustrated by situations."@e

label: Belief"@e
identifier: http://papo.com#Belief
stereotype: gufo:Kind
supertypes: gufo:IntrinsicMode
in domain of: :beliefInheresInPhishingTarget
in range of: :influences :targetTrustHasBelief

Complacency

label: Complacency"@e
identifier: http://papo.com#Complacency
stereotype: gufo:SubKind
supertypes: :MentalAttitude

Curiosity

label: Curiosity"@e
identifier: http://papo.com#Curiosity
stereotype: gufo:SubKind
supertypes: :MentalAttitude

DesireToPlease

label: Desire to Please"@e
identifier: http://papo.com#DesireToPlease
stereotype: gufo:SubKind
supertypes: :MentalAttitude

Distraction

label: Distraction"@e
identifier: http://papo.com#Distraction
stereotype: gufo:SubKind
supertypes: :MentalAttitude

Email

label: Email"@e
identifier: http://papo.com#Email
stereotype: gufo:Kind
supertypes: gufo:FunctionalComplex
subtypes: :LureEmail
in domain of: :sender :recipient :subject :body :sent_at :received_at :attachments_count

Fear

label: Fear"@e
identifier: http://papo.com#Fear
stereotype: gufo:SubKind
supertypes: :MentalAttitude

Fraud

Successful Phishing Attack Executions enable different Frauds. The latter include Extortion and Identity Theft. Fraud is a criminal event enabled by a successful Phishing Attack Execution. So, Fraud is not part of a Phishing Attack Execution but it may compose a Phishing Attack Process."@e

label: Fraud"@e
identifier: http://papo.com#Fraud
stereotype: gufo:EventType
supertypes: gufo:Event
in domain of: :fraudHistoricallyDependsOnPhishingAttackExecution
in range of: :phishingAttackProcessHasFraud

FulfillmentOfPhishersRequest

An event wherein a Target answers the Phisher's request. The exact form of this answer depends on the type of phishing attack. So, this event can generalize at least three others: (a) Malware-based attack; (b) Target replies Phisher with requested asset; (c) Webpage-based attack. Fulfillment of Phisher's Request corresponds to what is known as "falling for a phishing attack"."@e

label: Fulfillment of Phisher's Request"@e
identifier: http://papo.com#FulfillmentOfPhishersRequest
stereotype: gufo:EventType
supertypes: :TrustBasedAction
in domain of: :fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception
in range of: :phishingAttackExecutionHasFulfillmentOfPhishersRequest :targetFragilityManifestedInFulfillmentOfPhishersRequest :targetAssetParticipatedInFulfillmentOfPhishersRequest :facilitates

Greed

label: Greed"@e
identifier: http://papo.com#Greed
stereotype: gufo:SubKind
supertypes: :MentalAttitude

HookWebpage

According to Markus Jakobsson, the hook often consists of a website that emulates the appearance of a reputable agent, such as Microsoft's login website. The goal of the hook is for victims to be directed to it via the lure message and for the victims to disclose confidential information in it."@e

label: Hook Webpage"@e
identifier: http://papo.com#HookWebpage
stereotype: gufo:Role
supertypes: :PhishingEnabler :PhishingParticipantTrustee :Webpage
in domain of: :hook_impersonated_agent :requests
in range of: :forawardsTo

Hurry

label: Hurry"@e
identifier: http://papo.com#Hurry
stereotype: gufo:SubKind
supertypes: :MentalAttitude

Ignorance

label: Ignorance"@e
identifier: http://papo.com#Ignorance
stereotype: gufo:SubKind
supertypes: :MentalAttitude

ImpersonatedReputableAgent

An Agent impersonated by the Phisher. It is very often a company or an organization previously trusted by the Phishing Target."@e

label: Impersonated Reputable Agent"@e
identifier: http://papo.com#ImpersonatedReputableAgent
stereotype: gufo:Role
supertypes: :Agent :PhishingParticipantTrustee
in domain of: :impersonated_agent_name
in range of: :impersonated

IndividualPhisher

label: Individual Phisher"@e
identifier: http://papo.com#IndividualPhisher
stereotype: gufo:Role
supertypes: :Phisher :Person

Influence

Influence is a relator that aggregates Intrinsic Aspects that affect the formation of Beliefs. Its attribute weight describes the degree of this effect. Amaral, G., Sales, T.P., Guizzardi, G. and Porello, D., 2021. Ontological foundations for trust management: extending the reference ontology of trust. In CEUR workshop proceedings (Vol. 2835, pp. 12-22). Rheinisch Westfälische Technische Hochschule."@e

label: Influence"@e
identifier: http://papo.com#Influence
stereotype: gufo:Kind
supertypes: gufo:Relator
in domain of: :weight :influences

Innocence

label: Innocence"@e
identifier: http://papo.com#Innocence
stereotype: gufo:SubKind
supertypes: :MentalAttitude

Intention

In UFO-C, Intentions are desired state of affairs for which the agent commits at pursuing (internal commitment) (e.g., the Intention of going to a beach resort for the next summer break). For this reason, intentions cause the agent to perform Actions. The propositional content of an Intention is a Goal. The precise relation between an intentional moment and a situation is the following: situation in reality can satisfy the propositional content of an intentional moment (i.e., satisfy - in the logical sense – the proposition representing that propositional content). Guizzardi, G., de Almeida Falbo, R. and Guizzardi, R.S., 2008, February. Grounding software domain ontologies in the unified foundational ontology (ufo): the case of the ode software process ontology. In CIbSE (pp. 127-140)."@e

label: Intention"@e
identifier: http://papo.com#Intention
stereotype: gufo:Kind
supertypes: gufo:IntrinsicMode
in domain of: :intentionInheresInPhishingTarget
in range of: :targetTrustHasIntention

Loneliness

label: Loneliness"@e
identifier: http://papo.com#Loneliness
stereotype: gufo:SubKind
supertypes: :MentalAttitude

LureEmail

label: Lure Email"@e
identifier: http://papo.com#LureEmail
stereotype: gufo:Role
supertypes: :LureMessage :Email
in domain of: :lure_email_campaign :forawardsTo

LureMessage

A Message that plays the role of luring and tricking Phishing Targets to obtain Target Asset. Lure Message sends Trust Calibration Signals based on its content, such as a company logo. Examples include e-mails, SMS, direct message on social media, etc."@e

label: Lure Message"@e
identifier: http://papo.com#LureMessage
stereotype: gufo:RoleMixin
supertypes: :PhishingParticipantTrustee
subtypes: :LureEmail
in domain of: :lure_impersonated_agent :usedIn :dispatchedTo :lureMessageParticipatedInPhishingAttackExecution :discusses

LureMessageArrival

An event wherein a Lure Message arrives to the Target via whatever medium is used."@e

label: Lure Message Arrival"@e
identifier: http://papo.com#LureMessageArrival
stereotype: gufo:EventType
supertypes: gufo:Event
in domain of: :lureMessageArrivalHistoricallyDependsOnLureMessageDispatch
in range of: :lureMessagePerceptionHistoricallyDependsOnLureMessageArrival :phishingAttackExecutionHasLureMessageArrival

LureMessageDispatch

An event wherein a Phisher sends a Lure Message by some means, such as sending an email, SMS, a direct message on a social network, or making a phone call. It necessarily composes a Phishing Attack Execution."@e

label: Lure Message Dispatch"@e
identifier: http://papo.com#LureMessageDispatch
stereotype: gufo:EventType
supertypes: gufo:Event
in range of: :lureMessageArrivalHistoricallyDependsOnLureMessageDispatch :phishingAttackExecutionHasLureMessageDispatch

LureMessagePerception

An event wherein a Phishing Target somehow perceives a Lure Message. For example, by reading an email."@e

label: Lure Message Perception"@e
identifier: http://papo.com#LureMessagePerception
stereotype: gufo:EventType
supertypes: gufo:Event
in domain of: :lureMessagePerceptionHistoricallyDependsOnLureMessageArrival
in range of: :fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception :phishingAttackExecutionHasLureMessagePerception

MentalAttitude

In UFO-C, Intentions are a type of Intentional Aspect, along with beliefs and desires. However, there are other types of Intentional Aspects.Philosophers, psychologists, and cognitive scientists call them "mental attitudes'' or "propositional attitudes''. Attitude reports are sentences concerning cognitive relations people bear to propositions. Just like we can believe, desire, and intend, we can also know, learn, regret, imagine, fear, wish, want, pretend, suppose, surmise, suspect, predict, speculate, doubt, prove, disprove, infer, expect, and so on. These are all propositional attitudes. There is a wide range of literature on what exactly they are and whether they even exist. See: https://iep.utm.edu/prop-ati/, https://plato.stanford.edu/entries/prop-attitude-reports/."@e

label: Mental Attitude"@e
identifier: http://papo.com#MentalAttitude
stereotype: gufo:Kind
supertypes: gufo:IntrinsicMode
subtypes: :TargetFragility :Innocence :Loneliness :Complacency :Greed :Urgency :Fear :DesireToPlease :Ignorance :Hurry :Curiosity :Distraction

Organization

label: Organization"@e
identifier: http://papo.com#Organization
stereotype: gufo:Kind
supertypes: :Agent
subtypes: :PhisherOrganization
in domain of: :organization_name :status

Person

Human being. Any member of Homo sapiens, unique extant species of the genus Homo. A subtype of physical agent"@e

label: Person"@e
identifier: http://papo.com#Person
stereotype: gufo:Kind
supertypes: :Agent
subtypes: :PhishingTarget :IndividualPhisher
in domain of: :person_name :gender :nationality :date_of_birth :highest_education_level
in range of: :aimsToTrick

Phisher

An Agent that participates in a Phishing Attack Process by being the actor of the Phishing Attack Planning, Preparation, and Execution."@e

label: Phisher"@e
identifier: http://papo.com#Phisher
stereotype: gufo:Role
supertypes: :Agent
subtypes: :IndividualPhisher :PhisherOrganization
in domain of: :carriedOut :made :executed :impersonated
in range of: :designedBy :phishingAttackCapabilityInheresInPhisher

PhisherOrganization

label: Phisher Organization"@e
identifier: http://papo.com#PhisherOrganization
stereotype: gufo:Role
supertypes: :Phisher :Organization

PhishingAttackCapability

Capabilities whose manifestations are the events of a Phishing Attack Execution."@e

label: Phishing Attack Capability"@e
identifier: http://papo.com#PhishingAttackCapability
stereotype: gufo:RoleMixin
supertypes: gufo:IntrinsicMode
in domain of: :acquiredThrough :phishingAttackCapabilityInheresInPhisher :phishingAttackCapabilityManifestedInPhishingAttackExecution

PhishingAttackExecution

A successful Phishing Attack Execution (or a phishing incident) is an event composed by at least four others in a temporal order: (a) Lure Message Dispatch (by the Phisher), (b) Lure Message Arrival, (c) Phishing Target perceives Lure Message, (d) Target answers the Phisher's request. Failed attempts of Phishing Attack Execution must have at least the first event (Phisher dispatches Lure Message). Phishing Attack Execution describes what is commonly considered a phishing attack and its basic steps."@e

label: Phishing Attack Execution"@e
identifier: http://papo.com#PhishingAttackExecution
stereotype: gufo:EventType
supertypes: gufo:Event
in domain of: :phishingAttackExecutionHistoricallyDependsOnPhishingAttackPreparation :phishingAttackExecutionHasLureMessageDispatch :phishingAttackExecutionHasLureMessageArrival :phishingAttackExecutionHasLureMessagePerception :phishingAttackExecutionHasFulfillmentOfPhishersRequest
in range of: :fraudHistoricallyDependsOnPhishingAttackExecution :postAttackPhaseHistoricallyDependsOnPhishingAttackExecution :phishingAttackProcessHasPhishingAttackExecution :phishingAttackCapabilityManifestedInPhishingAttackExecution :executed :phishingEnablerParticipatedInPhishingAttackExecution :lureMessageParticipatedInPhishingAttackExecution :phishingTargetParticipatedInPhishingAttackExecution

PhishingAttackPlanning

An event wherein a Phisher creates a Phishing Plan and makes important decisions for the rest of the Phishing Attack Process, such as deciding impersonated agent, fraud type, attack method, attack goal, targets, communication medium, etc."@e

label: Phishing Attack Planning"@e
identifier: http://papo.com#PhishingAttackPlanning
stereotype: gufo:EventType
supertypes: gufo:Event
in range of: :phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning :phishingAttackProcessHasPhishingAttackPlanning :createdBy :made

PhishingAttackPreparation

Phishing Attack Preparation is an event wherein a Phisher proceeds with necessary preparations for the Phishing Attack Execution. This means the Phisher acquires threatening capabilities for the attack execution, such as knowledge and tools (for example, phishing kits)."@e

label: Phishing Attack Preparation"@e
identifier: http://papo.com#PhishingAttackPreparation
stereotype: gufo:EventType
supertypes: gufo:Event
in domain of: :phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning
in range of: :phishingAttackExecutionHistoricallyDependsOnPhishingAttackPreparation :phishingAttackProcessHasPhishingAttackPreparation :acquiredThrough

PhishingAttackProcess

PAPO describes a Phishing Attack Process as a complex event that is necessarily composed of planning, preparation, and execution with optional subsequent fraud and post-attack events. Phishing Attack Preparation is historically dependent on Phishing Attack Planning, and Phishing Attack Execution is historically dependent on Phishing Attack Preparation. This represents a temporal causal order of Threat Events and Loss Events. Although Fraud and Post-Attack Phase may not occur as part of a Phishing Attack Process, they are historically dependent on Phishing Attack Execution."@e

label: Phishing Attack Process"@e
identifier: http://papo.com#PhishingAttackProcess
stereotype: gufo:EventType
supertypes: gufo:Event
in domain of: :phishingAttackProcessHasPhishingAttackPlanning :phishingAttackProcessHasPhishingAttackPreparation :phishingAttackProcessHasPhishingAttackExecution :phishingAttackProcessHasFraud :phishingAttackProcessHasPostAttackPhase
in range of: :carriedOut :experienced :usedIn :involvedIn :enabled

PhishingEnabler

A Phishing Enabler is an ancillary object that enables the Phishing Attack Execution. Hook webpages are examples of Phishing Enablers."@e

label: Phishing Enabler"@e
identifier: http://papo.com#PhishingEnabler
stereotype: gufo:RoleMixin
supertypes: gufo:FunctionalComplex
subtypes: :HookWebpage
in domain of: :enabled :phishingEnablerParticipatedInPhishingAttackExecution
in range of: :considers

PhishingParticipantTrustee

Phishing Participant Trustee generalizes Lure Message, Impersonated Reputable Agent, and Hook. It denotes the entities possibly trusted by the Phishing Target. A Trustee is the Agent or Object being trusted by an Agent for a given purpose, according to certain beliefs of this Agent (Trustor). Amaral, G., Sales, T.P., Guizzardi, G. and Porello, D., 2021. Ontological foundations for trust management: extending the reference ontology of trust. In CEUR workshop proceedings (Vol. 2835, pp. 12-22). Rheinisch Westfälische Technische Hochschule."@e

label: Phishing Participant Trustee"@e
identifier: http://papo.com#PhishingParticipantTrustee
stereotype: gufo:Category
supertypes: gufo:FunctionalComplex
subtypes: :HookWebpage :LureMessage :ImpersonatedReputableAgent
in range of: :dependsOn

PhishingPlan

A relational entity created by a Phishing Attack Planning mediating several entities that participates in a Phishing Attack Process."@e

label: Phishing Plan"@e
identifier: http://papo.com#PhishingPlan
stereotype: gufo:Kind
supertypes: gufo:ExtrinsicMode
in domain of: :createdBy :designedBy :aimsToImpersonate :aimsToTrick :aimsToCatch :employs :aimsToEnable :selects :considers

PhishingTarget

An Agent that participates in a Phishing Attack Process by being targeted in a Phishing Plan and possibly participating in other events of the phishing attack process."@e

label: Phishing Target"@e
identifier: http://papo.com#PhishingTarget
stereotype: gufo:Role
supertypes: :Person
in domain of: :experienced :phishingTargetParticipatedInPhishingAttackExecution
in range of: :intentionInheresInPhishingTarget :beliefInheresInPhishingTarget :dispatchedTo :targetFragilityInheresInPhishingTarget :targetTrustInheresInPhishingTarget

PostAttackPhase

Post-Attack Phase includes all events wherein a Phisher seeks to protect themselves against measures that can incriminate them, for example, by destroying evidence of a Phishing Attack Execution. Post-Attack Phase also includes the Phisher assessment of a Phishing Attack Execution."@e

label: Post-Attack Phase"@e
identifier: http://papo.com#PostAttackPhase
stereotype: gufo:EventType
supertypes: gufo:Event
in domain of: :postAttackPhaseHistoricallyDependsOnPhishingAttackExecution
in range of: :phishingAttackProcessHasPostAttackPhase

TargetAsset

A valuable object targeted by a Phishing Plan."@e

label: Target Asset"@e
identifier: http://papo.com#TargetAsset
stereotype: gufo:RoleMixin
supertypes: gufo:FunctionalComplex
in domain of: :asset_name :asset_type :importance_level :involvedIn :targetAssetParticipatedInFulfillmentOfPhishersRequest
in range of: :aimsToCatch :requests :discusses

TargetFragility

A subtype of Vulnerability that inheres in a Phishing Target. It describes the intrinsic properties of a Target that make them fall for a phish. It includes ignorance, inexperience, prejudice or bias, conformity, intuitive judgment, low level of need for cognition, heuristics, mental shortcuts, laziness, curiosity, fear, habits, anger, excitement, tension, happiness, sadness, disgust, guilt, surprise, greed, lust, neuroticism, and many others."@e

label: Target Fragility"@e
identifier: http://papo.com#TargetFragility
stereotype: gufo:Role
supertypes: :MentalAttitude :Vulnerability
in domain of: :targetFragilityInheresInPhishingTarget :targetFragilityManifestedInFulfillmentOfPhishersRequest

TargetTrust

The Reference Ontology of Trust (ROT) defines Trust as a complex mental state of a Trustor Agent, composed of an Intention related to a goal, for the achievement of which he counts upon the Trustee, and a set of Beliefs about the Trustee and its behavior. Amaral, G., Sales, T.P., Guizzardi, G. and Porello, D., 2021. Ontological foundations for trust management: extending the reference ontology of trust. In CEUR workshop proceedings (Vol. 2835, pp. 12-22). Rheinisch Westfälische Technische Hochschule."@e

label: Target Trust"@e
identifier: http://papo.com#TargetTrust
stereotype: gufo:Kind
supertypes: gufo:ExtrinsicMode
in domain of: :targetTrustInheresInPhishingTarget :targetTrustHasIntention :targetTrustHasBelief :targetTrustManifestedInTrustBasedAction :dependsOn

TrustBasedAction

Events that are the manifestation of the Target Trust."@e

label: Trust-based Action"@e
identifier: http://papo.com#TrustBasedAction
stereotype: gufo:EventType
supertypes: gufo:Event
subtypes: :FulfillmentOfPhishersRequest
in range of: :targetTrustManifestedInTrustBasedAction

Urgency

label: Urgency"@e
identifier: http://papo.com#Urgency
stereotype: gufo:SubKind
supertypes: :MentalAttitude

Vulnerability

Vulnerabilities are dispositions whose manifestations are undesired events, as in “the fragility of my phone's screen material makes it susceptible to breaking”. Sales, T.P., Baião, F., Guizzardi, G., Almeida, J.P.A., Guarino, N. and Mylopoulos, J., 2018. The common ontology of value and risk. In Conceptual Modeling: 37th International Conference, ER 2018, Xi'an, China, October 22–25, 2018, Proceedings 37 (pp. 121-135). Springer International Publishing."@e

label: Vulnerability"@e
identifier: http://papo.com#Vulnerability
stereotype: gufo:RoleMixin
supertypes: gufo:IntrinsicMode
subtypes: :TargetFragility

VulnerabilityCondition

label: Vulnerability Condition"@e
identifier: http://papo.com#VulnerabilityCondition
stereotype: gufo:SituationType
supertypes: gufo:Situation
in domain of: :facilitates

Webpage

label: Webpage"@e
identifier: http://papo.com#Webpage
stereotype: gufo:Kind
supertypes: gufo:FunctionalComplex
subtypes: :HookWebpage
in domain of: :webpage_url :online

4. Object Properties

acquiredThrough

label: acquired through"@e
identifier: http://papo.com#acquiredThrough
domain: :PhishingAttackCapability
range: :PhishingAttackPreparation

aimsToCatch

label: aims to catch"@e
identifier: http://papo.com#aimsToCatch
domain: :PhishingPlan
range: :TargetAsset

aimsToEnable

label: aims to enable"@e
identifier: http://papo.com#aimsToEnable
domain: :PhishingPlan
range: :FraudType

aimsToImpersonate

label: aims to impersonate"@e
identifier: http://papo.com#aimsToImpersonate
domain: :PhishingPlan
range: :Agent

aimsToTrick

label: aims to trick"@e
identifier: http://papo.com#aimsToTrick
domain: :PhishingPlan
range: :Person

beliefInheresInPhishingTarget

identifier: http://papo.com#beliefInheresInPhishingTarget
domain: :Belief
range: :PhishingTarget

carriedOut

label: carried out"@e
identifier: http://papo.com#carriedOut
domain: :Phisher
range: :PhishingAttackProcess

considers

label: considers"@e
identifier: http://papo.com#considers
domain: :PhishingPlan
range: :PhishingEnabler

createdBy

label: created by"@e
identifier: http://papo.com#createdBy
domain: :PhishingPlan
range: :PhishingAttackPlanning

dependsOn

label: depends on"@e
identifier: http://papo.com#dependsOn
domain: :TargetTrust
range: :PhishingParticipantTrustee

designedBy

label: designed by"@e
identifier: http://papo.com#designedBy
domain: :PhishingPlan
range: :Phisher

discusses

label: discusses"@e
identifier: http://papo.com#discusses
domain: :LureMessage
range: :TargetAsset

dispatchedTo

label: dispatched to"@e
identifier: http://papo.com#dispatchedTo
domain: :LureMessage
range: :PhishingTarget

employs

label: employs"@e
identifier: http://papo.com#employs
domain: :PhishingPlan
range: :AttackMethod

enabled

label: enabled"@e
identifier: http://papo.com#enabled
domain: :PhishingEnabler
range: :PhishingAttackProcess

executed

label: executed"@e
identifier: http://papo.com#executed
domain: :Phisher
range: :PhishingAttackExecution

experienced

label: experienced"@e
identifier: http://papo.com#experienced
domain: :PhishingTarget
range: :PhishingAttackProcess

facilitates

label: facilitates"@e
identifier: http://papo.com#facilitates
domain: :VulnerabilityCondition
range: :FulfillmentOfPhishersRequest

forawardsTo

label: forawards to"@e
identifier: http://papo.com#forawardsTo
domain: :LureEmail
range: :HookWebpage

fraudHistoricallyDependsOnPhishingAttackExecution

identifier: http://papo.com#fraudHistoricallyDependsOnPhishingAttackExecution
domain: :Fraud
range: :PhishingAttackExecution

fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception

identifier: http://papo.com#fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception
domain: :FulfillmentOfPhishersRequest
range: :LureMessagePerception

impersonated

label: impersonated"@e
identifier: http://papo.com#impersonated
domain: :Phisher
range: :ImpersonatedReputableAgent

influences

label: influences"@e
identifier: http://papo.com#influences
domain: :Influence
range: :Belief

intentionInheresInPhishingTarget

identifier: http://papo.com#intentionInheresInPhishingTarget
domain: :Intention
range: :PhishingTarget

involvedIn

label: involved in"@e
identifier: http://papo.com#involvedIn
domain: :TargetAsset
range: :PhishingAttackProcess

lureMessageArrivalHistoricallyDependsOnLureMessageDispatch

identifier: http://papo.com#lureMessageArrivalHistoricallyDependsOnLureMessageDispatch
domain: :LureMessageArrival
range: :LureMessageDispatch

lureMessageParticipatedInPhishingAttackExecution

identifier: http://papo.com#lureMessageParticipatedInPhishingAttackExecution
domain: :LureMessage
range: :PhishingAttackExecution

lureMessagePerceptionHistoricallyDependsOnLureMessageArrival

identifier: http://papo.com#lureMessagePerceptionHistoricallyDependsOnLureMessageArrival
domain: :LureMessagePerception
range: :LureMessageArrival

made

label: made"@e
identifier: http://papo.com#made
domain: :Phisher
range: :PhishingAttackPlanning

phishingAttackCapabilityInheresInPhisher

identifier: http://papo.com#phishingAttackCapabilityInheresInPhisher
domain: :PhishingAttackCapability
range: :Phisher

phishingAttackCapabilityManifestedInPhishingAttackExecution

identifier: http://papo.com#phishingAttackCapabilityManifestedInPhishingAttackExecution
domain: :PhishingAttackCapability
range: :PhishingAttackExecution

phishingAttackExecutionHasFulfillmentOfPhishersRequest

identifier: http://papo.com#phishingAttackExecutionHasFulfillmentOfPhishersRequest
domain: :PhishingAttackExecution
range: :FulfillmentOfPhishersRequest

phishingAttackExecutionHasLureMessageArrival

identifier: http://papo.com#phishingAttackExecutionHasLureMessageArrival
domain: :PhishingAttackExecution
range: :LureMessageArrival

phishingAttackExecutionHasLureMessageDispatch

identifier: http://papo.com#phishingAttackExecutionHasLureMessageDispatch
domain: :PhishingAttackExecution
range: :LureMessageDispatch

phishingAttackExecutionHasLureMessagePerception

identifier: http://papo.com#phishingAttackExecutionHasLureMessagePerception
domain: :PhishingAttackExecution
range: :LureMessagePerception

phishingAttackExecutionHistoricallyDependsOnPhishingAttackPreparation

identifier: http://papo.com#phishingAttackExecutionHistoricallyDependsOnPhishingAttackPreparation
domain: :PhishingAttackExecution
range: :PhishingAttackPreparation

phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning

identifier: http://papo.com#phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning
domain: :PhishingAttackPreparation
range: :PhishingAttackPlanning

phishingAttackProcessHasFraud

identifier: http://papo.com#phishingAttackProcessHasFraud
domain: :PhishingAttackProcess
range: :Fraud

phishingAttackProcessHasPhishingAttackExecution

identifier: http://papo.com#phishingAttackProcessHasPhishingAttackExecution
domain: :PhishingAttackProcess
range: :PhishingAttackExecution

phishingAttackProcessHasPhishingAttackPlanning

identifier: http://papo.com#phishingAttackProcessHasPhishingAttackPlanning
domain: :PhishingAttackProcess
range: :PhishingAttackPlanning

phishingAttackProcessHasPhishingAttackPreparation

identifier: http://papo.com#phishingAttackProcessHasPhishingAttackPreparation
domain: :PhishingAttackProcess
range: :PhishingAttackPreparation

phishingAttackProcessHasPostAttackPhase

identifier: http://papo.com#phishingAttackProcessHasPostAttackPhase
domain: :PhishingAttackProcess
range: :PostAttackPhase

phishingEnablerParticipatedInPhishingAttackExecution

identifier: http://papo.com#phishingEnablerParticipatedInPhishingAttackExecution
domain: :PhishingEnabler
range: :PhishingAttackExecution

phishingTargetParticipatedInPhishingAttackExecution

identifier: http://papo.com#phishingTargetParticipatedInPhishingAttackExecution
domain: :PhishingTarget
range: :PhishingAttackExecution

postAttackPhaseHistoricallyDependsOnPhishingAttackExecution

identifier: http://papo.com#postAttackPhaseHistoricallyDependsOnPhishingAttackExecution
domain: :PostAttackPhase
range: :PhishingAttackExecution

requests

label: requests"@e
identifier: http://papo.com#requests
domain: :HookWebpage
range: :TargetAsset

selects

label: selects"@e
identifier: http://papo.com#selects
domain: :PhishingPlan
range: :MessageMediumType

targetAssetParticipatedInFulfillmentOfPhishersRequest

identifier: http://papo.com#targetAssetParticipatedInFulfillmentOfPhishersRequest
domain: :TargetAsset
range: :FulfillmentOfPhishersRequest

targetFragilityInheresInPhishingTarget

identifier: http://papo.com#targetFragilityInheresInPhishingTarget
domain: :TargetFragility
range: :PhishingTarget

targetFragilityManifestedInFulfillmentOfPhishersRequest

label: "@e
identifier: http://papo.com#targetFragilityManifestedInFulfillmentOfPhishersRequest
domain: :TargetFragility
range: :FulfillmentOfPhishersRequest

targetTrustHasBelief

identifier: http://papo.com#targetTrustHasBelief
domain: :TargetTrust
range: :Belief

targetTrustHasIntention

identifier: http://papo.com#targetTrustHasIntention
domain: :TargetTrust
range: :Intention

targetTrustInheresInPhishingTarget

identifier: http://papo.com#targetTrustInheresInPhishingTarget
domain: :TargetTrust
range: :PhishingTarget

targetTrustManifestedInTrustBasedAction

identifier: http://papo.com#targetTrustManifestedInTrustBasedAction
domain: :TargetTrust
range: :TrustBasedAction

usedIn

label: used in"@e
identifier: http://papo.com#usedIn
domain: :LureMessage
range: :PhishingAttackProcess

5. Datatype Properties

asset_name

label: asset_name"@e
identifier: http://papo.com#asset_name
domain: :TargetAsset
range: xsd:string

asset_type

label: asset_type"@e
identifier: http://papo.com#asset_type
domain: :TargetAsset
range: xsd:string

attachments_count

label: attachments_count"@e
identifier: http://papo.com#attachments_count
domain: :Email
range: xsd:int

body

label: body"@e
identifier: http://papo.com#body
domain: :Email
range: xsd:string

date_of_birth

xsd:date"@e

label: date_of_birth"@e
identifier: http://papo.com#date_of_birth
domain: :Person

gender

label: gender"@e
identifier: http://papo.com#gender
domain: :Person
range: xsd:string

highest_education_level

label: highest_education_level"@e
identifier: http://papo.com#highest_education_level
domain: :Person
range: xsd:string

hook_impersonated_agent

label: hook_impersonated_agent"@e
identifier: http://papo.com#hook_impersonated_agent
domain: :HookWebpage
range: xsd:string

impersonated_agent_name

label: impersonated_agent_name"@e
identifier: http://papo.com#impersonated_agent_name
domain: :ImpersonatedReputableAgent
range: xsd:string

importance_level

label: importance_level"@e
identifier: http://papo.com#importance_level
domain: :TargetAsset
range: xsd:string

lure_email_campaign

label: lure_email_campaign"@e
identifier: http://papo.com#lure_email_campaign
domain: :LureEmail
range: xsd:string

lure_impersonated_agent

label: lure_impersonated_agent"@e
identifier: http://papo.com#lure_impersonated_agent
domain: :LureMessage
range: xsd:string

nationality

label: nationality"@e
identifier: http://papo.com#nationality
domain: :Person
range: xsd:string

online

label: online"@e
identifier: http://papo.com#online
domain: :Webpage
range: xsd:boolean

organization_name

label: organization_name"@e
identifier: http://papo.com#organization_name
domain: :Organization
range: xsd:string

person_name

label: person_name"@e
identifier: http://papo.com#person_name
domain: :Person
range: xsd:string

received_at

xsd:dateTimeStamp"@e

label: received_at"@e
identifier: http://papo.com#received_at
domain: :Email

recipient

label: recipient"@e
identifier: http://papo.com#recipient
domain: :Email
range: xsd:string

sender

label: sender"@e
identifier: http://papo.com#sender
domain: :Email
range: xsd:string

sent_at

xsd:dateTimeStamp"@e

label: sent_at"@e
identifier: http://papo.com#sent_at
domain: :Email

status

label: status"@e
identifier: http://papo.com#status
domain: :Organization
range: xsd:string

subject

label: subject"@e
identifier: http://papo.com#subject
domain: :Email
range: xsd:string

webpage_url

label: webpage_url"@e
identifier: http://papo.com#webpage_url
domain: :Webpage
range: xsd:string

weight

label: weight"@e
identifier: http://papo.com#weight
domain: :Influence
range: xsd:int