UNPKG

@mitre-attack/attack-data-model

Version:

A TypeScript API for the MITRE ATT&CK data model

185 lines (183 loc) 3.69 kB
// src/schemas/common/open-vocabulary.ts import { z } from "zod"; var MalwareTypeOpenVocabulary = z.enum([ "adware", "backdoor", "bot", "bootkit", "ddos", "downloader", "dropper", "exploit-kit", "keylogger", "ransomware", "remote-access-trojan", "resource-exploitation", "rogue-security-software", "rootkit", "screen-capture", "spyware", "trojan", "virus", "webshell", "wiper", "worm", "unknown" ]); var ProcessorArchitecturesOpenVocabulary = z.enum([ "alpha", "arm", "ia-64", "mips", "powerpc", "sparc", "x86", "x86-64" ]); var ImplementationLanguagesOpenVocabulary = z.enum([ "applescript", "bash", "c", "c++", "c#", "go", "java", "javascript", "lua", "objective-c", "perl", "php", "powershell", "python", "ruby", "scala", "swift", "typescript", "visual-basic", "x86-32", "x86-64" ]); var MalwareCapabilitiesOpenVocabulary = z.enum([ "accesses-remote-machines", "anti-debugging", "anti-disassembly", "anti-emulation", "anti-memory-forensics", "anti-sandbox", "anti-vm", "captures-input-peripherals", "captures-output-peripherals", "captures-system-state-data", "cleans-traces-of-infection", "commits-fraud", "communicates-with-c2", "compromises-data-integrity", "compromises-data-availability", "compromises-system-availability", "controls-local-machine", "degrades-security-software", "degrades-system-updates", "determines-c2-server", "emails-spam", "escalates-privileges", "evades-av", "exfiltrates-data", "fingerprints-host", "hides-artifacts", "hides-executing-code", "infects-files", "infects-remote-machines", "installs-other-components", "persists-after-system-reboot", "prevents-artifact-access", "prevents-artifact-deletion", "probes-network-environment", "self-modifies", "steals-authentication-credentials", "violates-system-operational-integrity" ]); var ToolTypesOpenVocabulary = z.enum([ "denial-of-service", "exploitation", "information-gathering", "network-capture", "credential-exploitation", "remote-access", "vulnerability-scanning", "unknown" ]); var identityClassOpenVocabulary = z.enum([ "individual", "group", "system", "organization", "class", "unspecified" ]); var attackMotivationOpenVocabulary = z.enum([ "accidental", "coercion", "dominance", "ideology", "notoriety", "organizational-gain", "personal-gain", "personal-satisfaction", "revenge", "unpredictable" ]); var attackResourceLevelOpenVocabulary = z.enum([ "individual", "club", "contest", "team", "organization", "government" ]); var industrySectorOpenVocabulary = z.enum([ "agriculture", "aerospace", "automotive", "chemical", "commercial", "communications", "construction", "defense", "education", "energy", "entertainment", "financial-services", "government", "government-emergency-services", "government-local", "government-national", "government-public-services", "government-regional", "healthcare", "hospitality-leisure", "infrastructure", "infrastructure-dams", "infrastructure-nuclear", "infrastructure-water", "insurance", "manufacturing", "mining", "non-profit", "pharmaceuticals", "retail", "technology", "telecommunications", "transportation", "utilities" ]); export { MalwareTypeOpenVocabulary, ProcessorArchitecturesOpenVocabulary, ImplementationLanguagesOpenVocabulary, MalwareCapabilitiesOpenVocabulary, ToolTypesOpenVocabulary, identityClassOpenVocabulary, attackMotivationOpenVocabulary, attackResourceLevelOpenVocabulary, industrySectorOpenVocabulary };