
org.mitre.maec.default_vocabularies_1.DataTheftTacticalObjectivesEnum10 Maven / Gradle / Ivy
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:30:29 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for DataTheftTacticalObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="DataTheftTacticalObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="steal dialed phone numbers"/>
* <enumeration value="steal email data"/>
* <enumeration value="steal referrer urls"/>
* <enumeration value="steal cryptocurrency data"/>
* <enumeration value="steal pki software certificate"/>
* <enumeration value="steal browser cache"/>
* <enumeration value="steal serial numbers"/>
* <enumeration value="steal sms database"/>
* <enumeration value="steal cookie"/>
* <enumeration value="steal password hash"/>
* <enumeration value="steal make/model"/>
* <enumeration value="steal documents"/>
* <enumeration value="steal network address"/>
* <enumeration value="steal open port"/>
* <enumeration value="steal images"/>
* <enumeration value="steal browser history"/>
* <enumeration value="steal web/network credential"/>
* <enumeration value="steal pki key"/>
* <enumeration value="steal contact list data"/>
* <enumeration value="steal database content"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "DataTheftTacticalObjectivesEnum-1.0")
@XmlEnum
public enum DataTheftTacticalObjectivesEnum10 {
/**
* The 'steal dialed phone numbers' value indicates that the malware instance is able to steal the list of phone numbers that a user has dialed.
*
*/
@XmlEnumValue("steal dialed phone numbers")
STEAL_DIALED_PHONE_NUMBERS("steal dialed phone numbers"),
/**
* The 'steal email data' value indicates that the malware instance is able to steal a user's email data.
*
*/
@XmlEnumValue("steal email data")
STEAL_EMAIL_DATA("steal email data"),
/**
* The 'steal referer urls' value indicates that the malware instance is able to steal HTTP referrer information (URL of the webpage that linked to the resource being requested).
*
*/
@XmlEnumValue("steal referrer urls")
STEAL_REFERRER_URLS("steal referrer urls"),
/**
* The 'steal cryptocurrency data' value indicates that the malware instance is able to steal cryptocurrency data (e.g., Bitcoin wallets).
*
*/
@XmlEnumValue("steal cryptocurrency data")
STEAL_CRYPTOCURRENCY_DATA("steal cryptocurrency data"),
/**
* The 'steal pki software certificate' value indicates that the malware instance is able to steal one or more public key infrastructure (PKI) software certficates.
*
*/
@XmlEnumValue("steal pki software certificate")
STEAL_PKI_SOFTWARE_CERTIFICATE("steal pki software certificate"),
/**
* The 'steal browser cache' value indicates that the malware instance is able to steal a user's browser cache.
*
*/
@XmlEnumValue("steal browser cache")
STEAL_BROWSER_CACHE("steal browser cache"),
/**
* The 'steal serial numbers' values indicates that the malware instance is able to steal serial numbers stored on a system.
*
*/
@XmlEnumValue("steal serial numbers")
STEAL_SERIAL_NUMBERS("steal serial numbers"),
/**
* The 'steal sms database' value indicates that the malware instance is able to steal a user's short message service (SMS) (text messaging) database.
*
*/
@XmlEnumValue("steal sms database")
STEAL_SMS_DATABASE("steal sms database"),
/**
* The 'steal cookie' value indicates that the malware instance is able to steal cookies.
*
*/
@XmlEnumValue("steal cookie")
STEAL_COOKIE("steal cookie"),
/**
* The 'steal password hashes' value indicates that the malware instance is able to steal password hashes.
*
*/
@XmlEnumValue("steal password hash")
STEAL_PASSWORD_HASH("steal password hash"),
/**
* The 'steal make/model' value indicates that the malware instance is able to steal the information on the make and/or model of a system.
*
*/
@XmlEnumValue("steal make/model")
STEAL_MAKE_MODEL("steal make/model"),
/**
* The 'steal documents' value indicates that the malware instance is able to steal document files stored on a system.
*
*/
@XmlEnumValue("steal documents")
STEAL_DOCUMENTS("steal documents"),
/**
* The 'steal network address' value indicates that the malware instance is able to steal information about the network addresses used by a system.
*
*/
@XmlEnumValue("steal network address")
STEAL_NETWORK_ADDRESS("steal network address"),
/**
* The 'steal open port' value indicates that the malware instance is able to steal information about the open ports on a system.
*
*/
@XmlEnumValue("steal open port")
STEAL_OPEN_PORT("steal open port"),
/**
* The 'steal images' value indicates that the malware instance is able to steal image files stored on a system.
*
*/
@XmlEnumValue("steal images")
STEAL_IMAGES("steal images"),
/**
* The 'steal browser history' value indicates that the malware instance is able to steal a user's browser history.
*
*/
@XmlEnumValue("steal browser history")
STEAL_BROWSER_HISTORY("steal browser history"),
/**
* The 'steal web/network credential' value indicates that the malware instance is able to steal usernames, passwords, or other forms of network credentials.
*
*/
@XmlEnumValue("steal web/network credential")
STEAL_WEB_NETWORK_CREDENTIAL("steal web/network credential"),
/**
* The 'steal pki key' value indicates that the malware instance is able to steal one or more public key infrastructure (PKI) keys.
*
*/
@XmlEnumValue("steal pki key")
STEAL_PKI_KEY("steal pki key"),
/**
* The 'steal contact list data' value indicates that the malware instance is able to steal a user's contact list.
*
*/
@XmlEnumValue("steal contact list data")
STEAL_CONTACT_LIST_DATA("steal contact list data"),
/**
* The 'steal database content' value indicates that the malware instance is able to steal database content.
*
*/
@XmlEnumValue("steal database content")
STEAL_DATABASE_CONTENT("steal database content");
private final String value;
DataTheftTacticalObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static DataTheftTacticalObjectivesEnum10 fromValue(String v) {
for (DataTheftTacticalObjectivesEnum10 c : DataTheftTacticalObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy