All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.mitre.maec.default_vocabularies_1.DataTheftTacticalObjectivesEnum10 Maven / Gradle / Ivy

There is a newer version: 1.2.0.2
Show newest version
/**
 * Copyright (c) 2015, The MITRE Corporation. All rights reserved.
 * See LICENSE for complete terms.
 */

//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2 
// See http://java.sun.com/xml/jaxb 
// Any modifications to this file will be lost upon recompilation of the source schema. 
// Generated on: 2015.06.23 at 10:59:44 AM EDT 
//

package org.mitre.maec.default_vocabularies_1;

import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;

/**
 * 

Java class for DataTheftTacticalObjectivesEnum-1.0. * *

The following schema fragment specifies the expected content contained within this class. *

*

 * <simpleType name="DataTheftTacticalObjectivesEnum-1.0">
 *   <restriction base="{http://www.w3.org/2001/XMLSchema}string">
 *     <enumeration value="steal dialed phone numbers"/>
 *     <enumeration value="steal email data"/>
 *     <enumeration value="steal referrer urls"/>
 *     <enumeration value="steal cryptocurrency data"/>
 *     <enumeration value="steal pki software certificate"/>
 *     <enumeration value="steal browser cache"/>
 *     <enumeration value="steal serial numbers"/>
 *     <enumeration value="steal sms database"/>
 *     <enumeration value="steal cookie"/>
 *     <enumeration value="steal password hash"/>
 *     <enumeration value="steal make/model"/>
 *     <enumeration value="steal documents"/>
 *     <enumeration value="steal network address"/>
 *     <enumeration value="steal open port"/>
 *     <enumeration value="steal images"/>
 *     <enumeration value="steal browser history"/>
 *     <enumeration value="steal web/network credential"/>
 *     <enumeration value="steal pki key"/>
 *     <enumeration value="steal contact list data"/>
 *     <enumeration value="steal database content"/>
 *   </restriction>
 * </simpleType>
 * 
* */ @XmlType(name = "DataTheftTacticalObjectivesEnum-1.0") @XmlEnum public enum DataTheftTacticalObjectivesEnum10 { /** * The 'steal dialed phone numbers' value indicates that the malware instance is able to steal the list of phone numbers that a user has dialed. * */ @XmlEnumValue("steal dialed phone numbers") STEAL_DIALED_PHONE_NUMBERS("steal dialed phone numbers"), /** * The 'steal email data' value indicates that the malware instance is able to steal a user's email data. * */ @XmlEnumValue("steal email data") STEAL_EMAIL_DATA("steal email data"), /** * The 'steal referer urls' value indicates that the malware instance is able to steal HTTP referrer information (URL of the webpage that linked to the resource being requested). * */ @XmlEnumValue("steal referrer urls") STEAL_REFERRER_URLS("steal referrer urls"), /** * The 'steal cryptocurrency data' value indicates that the malware instance is able to steal cryptocurrency data (e.g., Bitcoin wallets). * */ @XmlEnumValue("steal cryptocurrency data") STEAL_CRYPTOCURRENCY_DATA("steal cryptocurrency data"), /** * The 'steal pki software certificate' value indicates that the malware instance is able to steal one or more public key infrastructure (PKI) software certficates. * */ @XmlEnumValue("steal pki software certificate") STEAL_PKI_SOFTWARE_CERTIFICATE("steal pki software certificate"), /** * The 'steal browser cache' value indicates that the malware instance is able to steal a user's browser cache. * */ @XmlEnumValue("steal browser cache") STEAL_BROWSER_CACHE("steal browser cache"), /** * The 'steal serial numbers' values indicates that the malware instance is able to steal serial numbers stored on a system. * */ @XmlEnumValue("steal serial numbers") STEAL_SERIAL_NUMBERS("steal serial numbers"), /** * The 'steal sms database' value indicates that the malware instance is able to steal a user's short message service (SMS) (text messaging) database. * */ @XmlEnumValue("steal sms database") STEAL_SMS_DATABASE("steal sms database"), /** * The 'steal cookie' value indicates that the malware instance is able to steal cookies. * */ @XmlEnumValue("steal cookie") STEAL_COOKIE("steal cookie"), /** * The 'steal password hashes' value indicates that the malware instance is able to steal password hashes. * */ @XmlEnumValue("steal password hash") STEAL_PASSWORD_HASH("steal password hash"), /** * The 'steal make/model' value indicates that the malware instance is able to steal the information on the make and/or model of a system. * */ @XmlEnumValue("steal make/model") STEAL_MAKE_MODEL("steal make/model"), /** * The 'steal documents' value indicates that the malware instance is able to steal document files stored on a system. * */ @XmlEnumValue("steal documents") STEAL_DOCUMENTS("steal documents"), /** * The 'steal network address' value indicates that the malware instance is able to steal information about the network addresses used by a system. * */ @XmlEnumValue("steal network address") STEAL_NETWORK_ADDRESS("steal network address"), /** * The 'steal open port' value indicates that the malware instance is able to steal information about the open ports on a system. * */ @XmlEnumValue("steal open port") STEAL_OPEN_PORT("steal open port"), /** * The 'steal images' value indicates that the malware instance is able to steal image files stored on a system. * */ @XmlEnumValue("steal images") STEAL_IMAGES("steal images"), /** * The 'steal browser history' value indicates that the malware instance is able to steal a user's browser history. * */ @XmlEnumValue("steal browser history") STEAL_BROWSER_HISTORY("steal browser history"), /** * The 'steal web/network credential' value indicates that the malware instance is able to steal usernames, passwords, or other forms of network credentials. * */ @XmlEnumValue("steal web/network credential") STEAL_WEB_NETWORK_CREDENTIAL("steal web/network credential"), /** * The 'steal pki key' value indicates that the malware instance is able to steal one or more public key infrastructure (PKI) keys. * */ @XmlEnumValue("steal pki key") STEAL_PKI_KEY("steal pki key"), /** * The 'steal contact list data' value indicates that the malware instance is able to steal a user's contact list. * */ @XmlEnumValue("steal contact list data") STEAL_CONTACT_LIST_DATA("steal contact list data"), /** * The 'steal database content' value indicates that the malware instance is able to steal database content. * */ @XmlEnumValue("steal database content") STEAL_DATABASE_CONTENT("steal database content"); private final String value; DataTheftTacticalObjectivesEnum10(String v) { value = v; } public String value() { return value; } public static DataTheftTacticalObjectivesEnum10 fromValue(String v) { for (DataTheftTacticalObjectivesEnum10 c : DataTheftTacticalObjectivesEnum10 .values()) { if (c.value.equals(v)) { return c; } } throw new IllegalArgumentException(v); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy