org.mitre.maec.default_vocabularies_1.DataTheftTacticalObjectivesEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
The newest version!
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:19:53 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for DataTheftTacticalObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="DataTheftTacticalObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="steal dialed phone numbers"/>
* <enumeration value="steal email data"/>
* <enumeration value="steal referrer urls"/>
* <enumeration value="steal cryptocurrency data"/>
* <enumeration value="steal pki software certificate"/>
* <enumeration value="steal browser cache"/>
* <enumeration value="steal serial numbers"/>
* <enumeration value="steal sms database"/>
* <enumeration value="steal cookie"/>
* <enumeration value="steal password hash"/>
* <enumeration value="steal make/model"/>
* <enumeration value="steal documents"/>
* <enumeration value="steal network address"/>
* <enumeration value="steal open port"/>
* <enumeration value="steal images"/>
* <enumeration value="steal browser history"/>
* <enumeration value="steal web/network credential"/>
* <enumeration value="steal pki key"/>
* <enumeration value="steal contact list data"/>
* <enumeration value="steal database content"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "DataTheftTacticalObjectivesEnum-1.0")
@XmlEnum
public enum DataTheftTacticalObjectivesEnum10 {
/**
* The 'steal dialed phone numbers' value indicates that the malware instance is able to steal the list of phone numbers that a user has dialed.
*
*/
@XmlEnumValue("steal dialed phone numbers")
STEAL_DIALED_PHONE_NUMBERS("steal dialed phone numbers"),
/**
* The 'steal email data' value indicates that the malware instance is able to steal a user's email data.
*
*/
@XmlEnumValue("steal email data")
STEAL_EMAIL_DATA("steal email data"),
/**
* The 'steal referer urls' value indicates that the malware instance is able to steal HTTP referrer information (URL of the webpage that linked to the resource being requested).
*
*/
@XmlEnumValue("steal referrer urls")
STEAL_REFERRER_URLS("steal referrer urls"),
/**
* The 'steal cryptocurrency data' value indicates that the malware instance is able to steal cryptocurrency data (e.g., Bitcoin wallets).
*
*/
@XmlEnumValue("steal cryptocurrency data")
STEAL_CRYPTOCURRENCY_DATA("steal cryptocurrency data"),
/**
* The 'steal pki software certificate' value indicates that the malware instance is able to steal one or more public key infrastructure (PKI) software certficates.
*
*/
@XmlEnumValue("steal pki software certificate")
STEAL_PKI_SOFTWARE_CERTIFICATE("steal pki software certificate"),
/**
* The 'steal browser cache' value indicates that the malware instance is able to steal a user's browser cache.
*
*/
@XmlEnumValue("steal browser cache")
STEAL_BROWSER_CACHE("steal browser cache"),
/**
* The 'steal serial numbers' values indicates that the malware instance is able to steal serial numbers stored on a system.
*
*/
@XmlEnumValue("steal serial numbers")
STEAL_SERIAL_NUMBERS("steal serial numbers"),
/**
* The 'steal sms database' value indicates that the malware instance is able to steal a user's short message service (SMS) (text messaging) database.
*
*/
@XmlEnumValue("steal sms database")
STEAL_SMS_DATABASE("steal sms database"),
/**
* The 'steal cookie' value indicates that the malware instance is able to steal cookies.
*
*/
@XmlEnumValue("steal cookie")
STEAL_COOKIE("steal cookie"),
/**
* The 'steal password hashes' value indicates that the malware instance is able to steal password hashes.
*
*/
@XmlEnumValue("steal password hash")
STEAL_PASSWORD_HASH("steal password hash"),
/**
* The 'steal make/model' value indicates that the malware instance is able to steal the information on the make and/or model of a system.
*
*/
@XmlEnumValue("steal make/model")
STEAL_MAKE_MODEL("steal make/model"),
/**
* The 'steal documents' value indicates that the malware instance is able to steal document files stored on a system.
*
*/
@XmlEnumValue("steal documents")
STEAL_DOCUMENTS("steal documents"),
/**
* The 'steal network address' value indicates that the malware instance is able to steal information about the network addresses used by a system.
*
*/
@XmlEnumValue("steal network address")
STEAL_NETWORK_ADDRESS("steal network address"),
/**
* The 'steal open port' value indicates that the malware instance is able to steal information about the open ports on a system.
*
*/
@XmlEnumValue("steal open port")
STEAL_OPEN_PORT("steal open port"),
/**
* The 'steal images' value indicates that the malware instance is able to steal image files stored on a system.
*
*/
@XmlEnumValue("steal images")
STEAL_IMAGES("steal images"),
/**
* The 'steal browser history' value indicates that the malware instance is able to steal a user's browser history.
*
*/
@XmlEnumValue("steal browser history")
STEAL_BROWSER_HISTORY("steal browser history"),
/**
* The 'steal web/network credential' value indicates that the malware instance is able to steal usernames, passwords, or other forms of network credentials.
*
*/
@XmlEnumValue("steal web/network credential")
STEAL_WEB_NETWORK_CREDENTIAL("steal web/network credential"),
/**
* The 'steal pki key' value indicates that the malware instance is able to steal one or more public key infrastructure (PKI) keys.
*
*/
@XmlEnumValue("steal pki key")
STEAL_PKI_KEY("steal pki key"),
/**
* The 'steal contact list data' value indicates that the malware instance is able to steal a user's contact list.
*
*/
@XmlEnumValue("steal contact list data")
STEAL_CONTACT_LIST_DATA("steal contact list data"),
/**
* The 'steal database content' value indicates that the malware instance is able to steal database content.
*
*/
@XmlEnumValue("steal database content")
STEAL_DATABASE_CONTENT("steal database content");
private final String value;
DataTheftTacticalObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static DataTheftTacticalObjectivesEnum10 fromValue(String v) {
for (DataTheftTacticalObjectivesEnum10 c : DataTheftTacticalObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}