stix_schema_spy 1.0 → 1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (175) hide show
  1. checksums.yaml +8 -8
  2. data/config/1.1/stix/cybox/objects/Win_Hook_Object.xsd +1 -1
  3. data/config/1.1.1/stix/campaign.xsd +220 -0
  4. data/config/1.1.1/stix/course_of_action.xsd +191 -0
  5. data/config/1.1.1/stix/cybox/cybox_common.xsd +2700 -0
  6. data/config/1.1.1/stix/cybox/cybox_core.xsd +1145 -0
  7. data/config/1.1.1/stix/cybox/cybox_default_vocabularies.xsd +5180 -0
  8. data/config/1.1.1/stix/cybox/extensions/location/ciq_address_3.0.xsd +27 -0
  9. data/config/1.1.1/stix/cybox/extensions/platform/cpe2.3.xsd +34 -0
  10. data/config/1.1.1/stix/cybox/external/cpe_2.3/cpe-language_2.3.xsd +234 -0
  11. data/config/1.1.1/stix/cybox/external/cpe_2.3/cpe-naming_2.3.xsd +45 -0
  12. data/config/1.1.1/stix/cybox/external/cpe_2.3/xml.xsd +145 -0
  13. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/CommonTypes.xsd +104 -0
  14. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xAL-types.xsd +511 -0
  15. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xAL.xsd +672 -0
  16. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xNAL-types.xsd +36 -0
  17. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xNAL.xsd +126 -0
  18. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xNL-types.xsd +222 -0
  19. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xNL.xsd +284 -0
  20. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xPIL-types.xsd +854 -0
  21. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xPIL.xsd +1621 -0
  22. data/config/1.1.1/stix/cybox/external/oasis_ciq_3.0/xlink-2003-12-31.xsd +90 -0
  23. data/config/1.1.1/stix/cybox/objects/API_Object.xsd +55 -0
  24. data/config/1.1.1/stix/cybox/objects/ARP_Cache_Object.xsd +98 -0
  25. data/config/1.1.1/stix/cybox/objects/AS_Object.xsd +50 -0
  26. data/config/1.1.1/stix/cybox/objects/Account_Object.xsd +501 -0
  27. data/config/1.1.1/stix/cybox/objects/Address_Object.xsd +127 -0
  28. data/config/1.1.1/stix/cybox/objects/Archive_File_Object.xsd +134 -0
  29. data/config/1.1.1/stix/cybox/objects/Artifact_Object.xsd +212 -0
  30. data/config/1.1.1/stix/cybox/objects/Code_Object.xsd +417 -0
  31. data/config/1.1.1/stix/cybox/objects/Custom_Object.xsd +42 -0
  32. data/config/1.1.1/stix/cybox/objects/DNS_Cache_Object.xsd +53 -0
  33. data/config/1.1.1/stix/cybox/objects/DNS_Query_Object.xsd +164 -0
  34. data/config/1.1.1/stix/cybox/objects/DNS_Record_Object.xsd +92 -0
  35. data/config/1.1.1/stix/cybox/objects/Device_Object.xsd +65 -0
  36. data/config/1.1.1/stix/cybox/objects/Disk_Object.xsd +117 -0
  37. data/config/1.1.1/stix/cybox/objects/Disk_Partition_Object.xsd +199 -0
  38. data/config/1.1.1/stix/cybox/objects/Domain_Name_Object.xsd +57 -0
  39. data/config/1.1.1/stix/cybox/objects/Email_Message_Object.xsd +278 -0
  40. data/config/1.1.1/stix/cybox/objects/File_Object.xsd +397 -0
  41. data/config/1.1.1/stix/cybox/objects/GUI_Dialogbox_Object.xsd +41 -0
  42. data/config/1.1.1/stix/cybox/objects/GUI_Object.xsd +40 -0
  43. data/config/1.1.1/stix/cybox/objects/GUI_Window_Object.xsd +46 -0
  44. data/config/1.1.1/stix/cybox/objects/HTTP_Session_Object.xsd +633 -0
  45. data/config/1.1.1/stix/cybox/objects/Hostname_Object.xsd +45 -0
  46. data/config/1.1.1/stix/cybox/objects/Image_File_Object.xsd +124 -0
  47. data/config/1.1.1/stix/cybox/objects/Library_Object.xsd +114 -0
  48. data/config/1.1.1/stix/cybox/objects/Link_Object.xsd +36 -0
  49. data/config/1.1.1/stix/cybox/objects/Linux_Package_Object.xsd +75 -0
  50. data/config/1.1.1/stix/cybox/objects/Memory_Object.xsd +141 -0
  51. data/config/1.1.1/stix/cybox/objects/Mutex_Object.xsd +40 -0
  52. data/config/1.1.1/stix/cybox/objects/Network_Connection_Object.xsd +540 -0
  53. data/config/1.1.1/stix/cybox/objects/Network_Flow_Object.xsd +1559 -0
  54. data/config/1.1.1/stix/cybox/objects/Network_Packet_Object.xsd +2934 -0
  55. data/config/1.1.1/stix/cybox/objects/Network_Route_Entry_Object.xsd +155 -0
  56. data/config/1.1.1/stix/cybox/objects/Network_Route_Object.xsd +93 -0
  57. data/config/1.1.1/stix/cybox/objects/Network_Socket_Object.xsd +529 -0
  58. data/config/1.1.1/stix/cybox/objects/Network_Subnet_Object.xsd +64 -0
  59. data/config/1.1.1/stix/cybox/objects/PDF_File_Object.xsd +595 -0
  60. data/config/1.1.1/stix/cybox/objects/Pipe_Object.xsd +40 -0
  61. data/config/1.1.1/stix/cybox/objects/Port_Object.xsd +40 -0
  62. data/config/1.1.1/stix/cybox/objects/Process_Object.xsd +199 -0
  63. data/config/1.1.1/stix/cybox/objects/Product_Object.xsd +65 -0
  64. data/config/1.1.1/stix/cybox/objects/SMS_Message_Object.xsd +79 -0
  65. data/config/1.1.1/stix/cybox/objects/Semaphore_Object.xsd +50 -0
  66. data/config/1.1.1/stix/cybox/objects/Socket_Address_Object.xsd +50 -0
  67. data/config/1.1.1/stix/cybox/objects/System_Object.xsd +410 -0
  68. data/config/1.1.1/stix/cybox/objects/URI_Object.xsd +62 -0
  69. data/config/1.1.1/stix/cybox/objects/URL_History_Object.xsd +104 -0
  70. data/config/1.1.1/stix/cybox/objects/Unix_File_Object.xsd +164 -0
  71. data/config/1.1.1/stix/cybox/objects/Unix_Network_Route_Entry_Object.xsd +56 -0
  72. data/config/1.1.1/stix/cybox/objects/Unix_Pipe_Object.xsd +36 -0
  73. data/config/1.1.1/stix/cybox/objects/Unix_Process_Object.xsd +143 -0
  74. data/config/1.1.1/stix/cybox/objects/Unix_User_Account_Object.xsd +78 -0
  75. data/config/1.1.1/stix/cybox/objects/Unix_Volume_Object.xsd +41 -0
  76. data/config/1.1.1/stix/cybox/objects/User_Account_Object.xsd +110 -0
  77. data/config/1.1.1/stix/cybox/objects/User_Session_Object.xsd +60 -0
  78. data/config/1.1.1/stix/cybox/objects/Volume_Object.xsd +235 -0
  79. data/config/1.1.1/stix/cybox/objects/Whois_Object.xsd +430 -0
  80. data/config/1.1.1/stix/cybox/objects/Win_Computer_Account_Object.xsd +135 -0
  81. data/config/1.1.1/stix/cybox/objects/Win_Critical_Section_Object.xsd +40 -0
  82. data/config/1.1.1/stix/cybox/objects/Win_Driver_Object.xsd +270 -0
  83. data/config/1.1.1/stix/cybox/objects/Win_Event_Log_Object.xsd +137 -0
  84. data/config/1.1.1/stix/cybox/objects/Win_Event_Object.xsd +80 -0
  85. data/config/1.1.1/stix/cybox/objects/Win_Executable_File_Object.xsd +1311 -0
  86. data/config/1.1.1/stix/cybox/objects/Win_File_Object.xsd +269 -0
  87. data/config/1.1.1/stix/cybox/objects/Win_Filemapping_Object.xsd +175 -0
  88. data/config/1.1.1/stix/cybox/objects/Win_Handle_Object.xsd +351 -0
  89. data/config/1.1.1/stix/cybox/objects/Win_Hook_Object.xsd +152 -0
  90. data/config/1.1.1/stix/cybox/objects/Win_Kernel_Hook_Object.xsd +109 -0
  91. data/config/1.1.1/stix/cybox/objects/Win_Kernel_Object.xsd +128 -0
  92. data/config/1.1.1/stix/cybox/objects/Win_Mailslot_Object.xsd +56 -0
  93. data/config/1.1.1/stix/cybox/objects/Win_Memory_Page_Region_Object.xsd +198 -0
  94. data/config/1.1.1/stix/cybox/objects/Win_Mutex_Object.xsd +42 -0
  95. data/config/1.1.1/stix/cybox/objects/Win_Network_Route_Entry_Object.xsd +200 -0
  96. data/config/1.1.1/stix/cybox/objects/Win_Network_Share_Object.xsd +205 -0
  97. data/config/1.1.1/stix/cybox/objects/Win_Pipe_Object.xsd +73 -0
  98. data/config/1.1.1/stix/cybox/objects/Win_Prefetch_Object.xsd +113 -0
  99. data/config/1.1.1/stix/cybox/objects/Win_Process_Object.xsd +174 -0
  100. data/config/1.1.1/stix/cybox/objects/Win_Registry_Key_Object.xsd +290 -0
  101. data/config/1.1.1/stix/cybox/objects/Win_Semaphore_Object.xsd +42 -0
  102. data/config/1.1.1/stix/cybox/objects/Win_Service_Object.xsd +287 -0
  103. data/config/1.1.1/stix/cybox/objects/Win_System_Object.xsd +126 -0
  104. data/config/1.1.1/stix/cybox/objects/Win_System_Restore_Object.xsd +207 -0
  105. data/config/1.1.1/stix/cybox/objects/Win_Task_Object.xsd +755 -0
  106. data/config/1.1.1/stix/cybox/objects/Win_Thread_Object.xsd +146 -0
  107. data/config/1.1.1/stix/cybox/objects/Win_User_Account_Object.xsd +73 -0
  108. data/config/1.1.1/stix/cybox/objects/Win_Volume_Object.xsd +161 -0
  109. data/config/1.1.1/stix/cybox/objects/Win_Waitable_Timer_Object.xsd +90 -0
  110. data/config/1.1.1/stix/cybox/objects/X509_Certificate_Object.xsd +275 -0
  111. data/config/1.1.1/stix/data_marking.xsd +97 -0
  112. data/config/1.1.1/stix/exploit_target.xsd +324 -0
  113. data/config/1.1.1/stix/extensions/address/ciq_3.0_address.xsd +27 -0
  114. data/config/1.1.1/stix/extensions/attack_pattern/capec_2.7_attack_pattern.xsd +31 -0
  115. data/config/1.1.1/stix/extensions/identity/ciq_3.0_identity.xsd +113 -0
  116. data/config/1.1.1/stix/extensions/malware/maec_4.1_malware.xsd +31 -0
  117. data/config/1.1.1/stix/extensions/marking/simple_marking.xsd +31 -0
  118. data/config/1.1.1/stix/extensions/marking/terms_of_use_marking.xsd +31 -0
  119. data/config/1.1.1/stix/extensions/marking/tlp_marking.xsd +40 -0
  120. data/config/1.1.1/stix/extensions/structured_coa/generic_structured_coa.xsd +46 -0
  121. data/config/1.1.1/stix/extensions/test_mechanism/generic_test_mechanism.xsd +46 -0
  122. data/config/1.1.1/stix/extensions/test_mechanism/open_ioc_2010_test_mechanism.xsd +32 -0
  123. data/config/1.1.1/stix/extensions/test_mechanism/oval_5.10_test_mechanism.xsd +37 -0
  124. data/config/1.1.1/stix/extensions/test_mechanism/snort_test_mechanism.xsd +56 -0
  125. data/config/1.1.1/stix/extensions/test_mechanism/yara_test_mechanism.xsd +36 -0
  126. data/config/1.1.1/stix/extensions/vulnerability/cvrf_1.1_vulnerability.xsd +33 -0
  127. data/config/1.1.1/stix/external/capec_2.7/ap_schema_v2.7.xsd +3618 -0
  128. data/config/1.1.1/stix/external/cvrf_1.1/common.xsd +176 -0
  129. data/config/1.1.1/stix/external/cvrf_1.1/cpe-language_2.2a.xsd +182 -0
  130. data/config/1.1.1/stix/external/cvrf_1.1/cvrf.xsd +487 -0
  131. data/config/1.1.1/stix/external/cvrf_1.1/cvss-v2_0.9.xsd +415 -0
  132. data/config/1.1.1/stix/external/cvrf_1.1/dc.xsd +118 -0
  133. data/config/1.1.1/stix/external/cvrf_1.1/prod.xsd +292 -0
  134. data/config/1.1.1/stix/external/cvrf_1.1/scap-core_0.9.xsd +170 -0
  135. data/config/1.1.1/stix/external/cvrf_1.1/vuln.xsd +631 -0
  136. data/config/1.1.1/stix/external/cvrf_1.1/xml.xsd +287 -0
  137. data/config/1.1.1/stix/external/maec_4.1/maec_bundle_schema.xsd +1228 -0
  138. data/config/1.1.1/stix/external/maec_4.1/maec_container_schema.xsd +62 -0
  139. data/config/1.1.1/stix/external/maec_4.1/maec_default_vocabularies.xsd +5325 -0
  140. data/config/1.1.1/stix/external/maec_4.1/maec_package_schema.xsd +1095 -0
  141. data/config/1.1.1/stix/external/maec_4.1/metadataSharing.xsd +1712 -0
  142. data/config/1.1.1/stix/external/oasis_ciq_3.0/CommonTypes.xsd +104 -0
  143. data/config/1.1.1/stix/external/oasis_ciq_3.0/xAL-types.xsd +511 -0
  144. data/config/1.1.1/stix/external/oasis_ciq_3.0/xAL.xsd +672 -0
  145. data/config/1.1.1/stix/external/oasis_ciq_3.0/xNAL-types.xsd +36 -0
  146. data/config/1.1.1/stix/external/oasis_ciq_3.0/xNAL.xsd +126 -0
  147. data/config/1.1.1/stix/external/oasis_ciq_3.0/xNL-types.xsd +222 -0
  148. data/config/1.1.1/stix/external/oasis_ciq_3.0/xNL.xsd +284 -0
  149. data/config/1.1.1/stix/external/oasis_ciq_3.0/xPIL-types.xsd +854 -0
  150. data/config/1.1.1/stix/external/oasis_ciq_3.0/xPIL.xsd +1621 -0
  151. data/config/1.1.1/stix/external/oasis_ciq_3.0/xlink-2003-12-31.xsd +90 -0
  152. data/config/1.1.1/stix/external/open_ioc_2010/ioc-TR.xsd +25 -0
  153. data/config/1.1.1/stix/external/open_ioc_2010/ioc.xsd +105 -0
  154. data/config/1.1.1/stix/external/oval_5.10/oval-common-schema.xsd +781 -0
  155. data/config/1.1.1/stix/external/oval_5.10/oval-definitions-schema.xsd +1608 -0
  156. data/config/1.1.1/stix/external/oval_5.10/oval-variables-schema.xsd +84 -0
  157. data/config/1.1.1/stix/external/oval_5.10/xmldsig-core-schema.xsd +309 -0
  158. data/config/1.1.1/stix/incident.xsd +762 -0
  159. data/config/1.1.1/stix/indicator.xsd +368 -0
  160. data/config/1.1.1/stix/stix_common.xsd +923 -0
  161. data/config/1.1.1/stix/stix_core.xsd +253 -0
  162. data/config/1.1.1/stix/stix_default_vocabularies.xsd +2081 -0
  163. data/config/1.1.1/stix/threat_actor.xsd +182 -0
  164. data/config/1.1.1/stix/ttp.xsd +430 -0
  165. data/config/1.1.1/uber_schema.xsd +149 -0
  166. data/lib/stix_schema_spy/models/attribute.rb +1 -1
  167. data/lib/stix_schema_spy/models/element.rb +2 -9
  168. data/lib/stix_schema_spy/models/external_type.rb +29 -0
  169. data/lib/stix_schema_spy/models/has_children.rb +9 -9
  170. data/lib/stix_schema_spy/models/node.rb +7 -6
  171. data/lib/stix_schema_spy/models/schema.rb +6 -4
  172. data/lib/stix_schema_spy/models/type.rb +44 -5
  173. data/lib/stix_schema_spy/util/tasks.rb +15 -14
  174. data/lib/stix_schema_spy/version.rb +1 -1
  175. metadata +171 -9
@@ -0,0 +1,2081 @@
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:stixVocabs="http://stix.mitre.org/default_vocabularies-1" xmlns:cyboxCommon="http://cybox.mitre.org/common-2" xmlns:stixCommon="http://stix.mitre.org/common-1" targetNamespace="http://stix.mitre.org/default_vocabularies-1" elementFormDefault="qualified" version="1.1.1" xml:lang="English">
3
+ <xs:annotation>
4
+ <xs:documentation>This schema was originally developed by The MITRE Corporation. The STIX XML Schema implementation is maintained by The MITRE Corporation and developed by the open STIX Community. For more information, including how to get involved in the effort and how to submit change requests, please visit the STIX website at http://stix.mitre.org. </xs:documentation>
5
+ <xs:appinfo>
6
+ <schema>STIX Default Vocabularies</schema>
7
+ <version>1.1.1</version>
8
+ <date>05/08/2014 9:00:00 AM</date>
9
+ <short_description>Structured Threat Information eXpression (STIX) - Schematic implementation for controlled vocabularies used in the Structured Threat Information eXchange format.</short_description>
10
+ <terms_of_use>Copyright (c) 2012-2014, The MITRE Corporation. All rights reserved. The contents of this file are subject to the terms of the STIX License located at http://stix.mitre.org/about/termsofuse.html. See the STIX License for the specific language governing permissions and limitations for use of this schema. When distributing copies of the STIX Schema, this license header must be included. </terms_of_use>
11
+ </xs:appinfo>
12
+ </xs:annotation>
13
+ <xs:import namespace="http://stix.mitre.org/common-1" schemaLocation="stix_common.xsd"/>
14
+ <xs:import namespace="http://cybox.mitre.org/common-2" schemaLocation="cybox/cybox_common.xsd"/>
15
+ <!-- Package Intent Vocabulary -->
16
+ <xs:complexType name="PackageIntentVocab-1.0">
17
+ <xs:annotation>
18
+ <xs:documentation>
19
+ The PackageIntentVocab is the default STIX vocabulary for Package Intent.
20
+
21
+ Note that this vocabulary is under development. Feedback is appreciated and should be sent to the STIX discussion list.
22
+ </xs:documentation>
23
+ </xs:annotation>
24
+ <xs:simpleContent>
25
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
26
+ <xs:simpleType>
27
+ <xs:union memberTypes="stixVocabs:PackageIntentEnum-1.0"/>
28
+ </xs:simpleType>
29
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Package Intent Vocabulary"/>
30
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#PackageIntentVocab-1.0"/>
31
+ </xs:restriction>
32
+ </xs:simpleContent>
33
+ </xs:complexType>
34
+ <xs:simpleType name="PackageIntentEnum-1.0">
35
+ <xs:annotation>
36
+ <xs:documentation>The default set of values to use for a package intent in STIX.</xs:documentation>
37
+ <xs:appinfo>
38
+ <version>1.0</version>
39
+ </xs:appinfo>
40
+ </xs:annotation>
41
+ <xs:restriction base="xs:string">
42
+ <xs:enumeration value="Collective Threat Intelligence">
43
+ <xs:annotation>
44
+ <xs:documentation>Package is intended to convey a broad characterization of a threat across multiple facets.</xs:documentation>
45
+ </xs:annotation>
46
+ </xs:enumeration>
47
+ <xs:enumeration value="Threat Report">
48
+ <xs:annotation>
49
+ <xs:documentation>Package is intended to convey a broad characterization of a threat across multiple facets expressed as a cohesive report.</xs:documentation>
50
+ </xs:annotation>
51
+ </xs:enumeration>
52
+ <xs:enumeration value="Indicators">
53
+ <xs:annotation>
54
+ <xs:documentation>Package is intended to convey mainly indicators.</xs:documentation>
55
+ </xs:annotation>
56
+ </xs:enumeration>
57
+ <xs:enumeration value="Indicators - Phishing">
58
+ <xs:annotation>
59
+ <xs:documentation>Package is intended to convey mainly phishing indicators.</xs:documentation>
60
+ </xs:annotation>
61
+ </xs:enumeration>
62
+ <xs:enumeration value="Indicators - Watchlist">
63
+ <xs:annotation>
64
+ <xs:documentation>Package is intended to convey mainly network watchlist indicators.</xs:documentation>
65
+ </xs:annotation>
66
+ </xs:enumeration>
67
+ <xs:enumeration value="Indicators - Malware Artifacts">
68
+ <xs:annotation>
69
+ <xs:documentation>Package is intended to convey mainly malware artifact indicators.</xs:documentation>
70
+ </xs:annotation>
71
+ </xs:enumeration>
72
+ <xs:enumeration value="Indicators - Network Activity">
73
+ <xs:annotation>
74
+ <xs:documentation>Package is intended to convey mainly network activity indicators.</xs:documentation>
75
+ </xs:annotation>
76
+ </xs:enumeration>
77
+ <xs:enumeration value="Indicators - Endpoint Characteristics">
78
+ <xs:annotation>
79
+ <xs:documentation>Package is intended to convey mainly endpoint characteristics (hashes, registry values, installed software, known vulnerabilities, etc.) indicators.</xs:documentation>
80
+ </xs:annotation>
81
+ </xs:enumeration>
82
+ <xs:enumeration value="Campaign Characterization">
83
+ <xs:annotation>
84
+ <xs:documentation>Package is intended to convey mainly a characterization of one or more campaigns.</xs:documentation>
85
+ </xs:annotation>
86
+ </xs:enumeration>
87
+ <xs:enumeration value="Threat Actor Characterization">
88
+ <xs:annotation>
89
+ <xs:documentation>Package is intended to convey mainly a characterization of one or more threat actors.</xs:documentation>
90
+ </xs:annotation>
91
+ </xs:enumeration>
92
+ <xs:enumeration value="Exploit Characterization">
93
+ <xs:annotation>
94
+ <xs:documentation>Package is intended to convey mainly a characterization of one or more exploits.</xs:documentation>
95
+ </xs:annotation>
96
+ </xs:enumeration>
97
+ <xs:enumeration value="Attack Pattern Characterization">
98
+ <xs:annotation>
99
+ <xs:documentation>Package is intended to convey mainly a characterization of one or more attack patterns.</xs:documentation>
100
+ </xs:annotation>
101
+ </xs:enumeration>
102
+ <xs:enumeration value="Malware Characterization">
103
+ <xs:annotation>
104
+ <xs:documentation>Package is intended to convey mainly a characterization of one or more malware instances.</xs:documentation>
105
+ </xs:annotation>
106
+ </xs:enumeration>
107
+ <xs:enumeration value="TTP - Infrastructure">
108
+ <xs:annotation>
109
+ <xs:documentation>Package is intended to convey mainly a characterization of attacker infrastructure.</xs:documentation>
110
+ </xs:annotation>
111
+ </xs:enumeration>
112
+ <xs:enumeration value="TTP - Tools">
113
+ <xs:annotation>
114
+ <xs:documentation>Package is intended to convey mainly a characterization of attacker tools.</xs:documentation>
115
+ </xs:annotation>
116
+ </xs:enumeration>
117
+ <xs:enumeration value="Courses of Action">
118
+ <xs:annotation>
119
+ <xs:documentation>Package is intended to convey mainly a set of courses of action.</xs:documentation>
120
+ </xs:annotation>
121
+ </xs:enumeration>
122
+ <xs:enumeration value="Incident">
123
+ <xs:annotation>
124
+ <xs:documentation>Package is intended to convey mainly information about one or more incidents.</xs:documentation>
125
+ </xs:annotation>
126
+ </xs:enumeration>
127
+ <xs:enumeration value="Observations">
128
+ <xs:annotation>
129
+ <xs:documentation>Package is intended to convey mainly information about instantial observations (cyber observables).</xs:documentation>
130
+ </xs:annotation>
131
+ </xs:enumeration>
132
+ <xs:enumeration value="Observations - Email">
133
+ <xs:annotation>
134
+ <xs:documentation>Package is intended to convey mainly information about instantial email observations (email cyber observables).</xs:documentation>
135
+ </xs:annotation>
136
+ </xs:enumeration>
137
+ <xs:enumeration value="Malware Samples">
138
+ <xs:annotation>
139
+ <xs:documentation>Package is intended to convey a set of malware samples.</xs:documentation>
140
+ </xs:annotation>
141
+ </xs:enumeration>
142
+ </xs:restriction>
143
+ </xs:simpleType>
144
+ <!-- Confidence Vocabulary -->
145
+ <xs:complexType name="HighMediumLowVocab-1.0">
146
+ <xs:annotation>
147
+ <xs:documentation>The HighMediumLowVocab is the default STIX vocabulary for expressing basic values that may be high, medium, low, none, or unknown.</xs:documentation>
148
+ </xs:annotation>
149
+ <xs:simpleContent>
150
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
151
+ <xs:simpleType>
152
+ <xs:union memberTypes="stixVocabs:HighMediumLowEnum-1.0"/>
153
+ </xs:simpleType>
154
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default High/Medium/Low Vocabulary"/>
155
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#HighMediumLowVocab-1.0"/>
156
+ </xs:restriction>
157
+ </xs:simpleContent>
158
+ </xs:complexType>
159
+ <xs:simpleType name="HighMediumLowEnum-1.0">
160
+ <xs:annotation>
161
+ <xs:documentation>The default set of values to use for expressing a high/medium/low statement in STIX.</xs:documentation>
162
+ <xs:appinfo>
163
+ <version>1.0</version>
164
+ </xs:appinfo>
165
+ </xs:annotation>
166
+ <xs:restriction base="xs:string">
167
+ <xs:enumeration value="High"/>
168
+ <xs:enumeration value="Medium"/>
169
+ <xs:enumeration value="Low"/>
170
+ <xs:enumeration value="None"/>
171
+ <xs:enumeration value="Unknown"/>
172
+ </xs:restriction>
173
+ </xs:simpleType>
174
+ <!-- Malware Type Vocabulary -->
175
+ <xs:complexType name="MalwareTypeVocab-1.0">
176
+ <xs:annotation>
177
+ <xs:documentation>
178
+ The MalwareTypeVocab is the default STIX vocabulary for expressing types of malware instances.
179
+
180
+ Note that this vocabulary is under development. Feedback is appreciated and should be sent to the STIX discussion list.</xs:documentation>
181
+ </xs:annotation>
182
+ <xs:simpleContent>
183
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
184
+ <xs:simpleType>
185
+ <xs:union memberTypes="stixVocabs:MalwareTypeEnum-1.0"/>
186
+ </xs:simpleType>
187
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Malware Type Vocabulary"/>
188
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#MalwareTypeVocab-1.0"/>
189
+ </xs:restriction>
190
+ </xs:simpleContent>
191
+ </xs:complexType>
192
+ <xs:simpleType name="MalwareTypeEnum-1.0">
193
+ <xs:annotation>
194
+ <xs:documentation>
195
+ The default set of malware types to use for characterizing a malware instance in STIX.
196
+ </xs:documentation>
197
+ <xs:appinfo>
198
+ <version>1.0</version>
199
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
200
+ </xs:appinfo>
201
+ </xs:annotation>
202
+ <xs:restriction base="xs:string">
203
+ <xs:enumeration value="Automated Transfer Scripts"/>
204
+ <xs:enumeration value="Adware"/>
205
+ <xs:enumeration value="Dialer"/>
206
+ <xs:enumeration value="Bot"/>
207
+ <xs:enumeration value="Bot - Credential Theft"/>
208
+ <xs:enumeration value="Bot - DDoS"/>
209
+ <xs:enumeration value="Bot - Loader"/>
210
+ <xs:enumeration value="Bot - Spam"/>
211
+ <xs:enumeration value="DoS / DDoS"/>
212
+ <xs:enumeration value="DoS / DDoS - Participatory"/>
213
+ <xs:enumeration value="DoS / DDoS - Script"/>
214
+ <xs:enumeration value="DoS / DDoS - Stress Test Tools"/>
215
+ <xs:enumeration value="Exploit Kits"/>
216
+ <xs:enumeration value="POS / ATM Malware"/>
217
+ <xs:enumeration value="Ransomware"/>
218
+ <xs:enumeration value="Remote Access Trojan"/>
219
+ <xs:enumeration value="Rogue Antivirus"/>
220
+ <xs:enumeration value="Rootkit"/>
221
+ </xs:restriction>
222
+ </xs:simpleType>
223
+ <!-- Indicator Type Vocabulary -->
224
+ <xs:complexType name="IndicatorTypeVocab-1.1">
225
+ <xs:annotation>
226
+ <xs:documentation>
227
+ The IndicatorTypeVocab is the default STIX vocabulary for expressing indicator types.
228
+
229
+ Note that this vocabulary is under development. Feedback is appreciated and should be sent to the STIX discussion list.
230
+ </xs:documentation>
231
+ </xs:annotation>
232
+ <xs:simpleContent>
233
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
234
+ <xs:simpleType>
235
+ <xs:union memberTypes="stixVocabs:IndicatorTypeEnum-1.1"/>
236
+ </xs:simpleType>
237
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Indicator Type Vocabulary"/>
238
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#IndicatorTypeVocab-1.1"/>
239
+ </xs:restriction>
240
+ </xs:simpleContent>
241
+ </xs:complexType>
242
+ <xs:simpleType name="IndicatorTypeEnum-1.1">
243
+ <xs:annotation>
244
+ <xs:documentation>The default set of Indicator types to use for characterizing Indicators in STIX.</xs:documentation>
245
+ <xs:appinfo>
246
+ <version>1.1</version>
247
+ </xs:appinfo>
248
+ </xs:annotation>
249
+ <xs:restriction base="xs:string">
250
+ <xs:enumeration value="Malicious E-mail">
251
+ <xs:annotation>
252
+ <xs:documentation>Indicator describes suspected malicious e-mail (phishing, spear phishing, infected, etc.).</xs:documentation>
253
+ </xs:annotation>
254
+ </xs:enumeration>
255
+ <xs:enumeration value="IP Watchlist">
256
+ <xs:annotation>
257
+ <xs:documentation>Indicator describes a set of suspected malicious IP addresses or IP blocks.</xs:documentation>
258
+ </xs:annotation>
259
+ </xs:enumeration>
260
+ <xs:enumeration value="File Hash Watchlist">
261
+ <xs:annotation>
262
+ <xs:documentation>Indicator describes a set of hashes for suspected malicious files.</xs:documentation>
263
+ </xs:annotation>
264
+ </xs:enumeration>
265
+ <xs:enumeration value="Domain Watchlist">
266
+ <xs:annotation>
267
+ <xs:documentation>Indicator describes a set of suspected malicious domains.</xs:documentation>
268
+ </xs:annotation>
269
+ </xs:enumeration>
270
+ <xs:enumeration value="URL Watchlist">
271
+ <xs:annotation>
272
+ <xs:documentation>Indicator describes a set of suspected malicious URLS.</xs:documentation>
273
+ </xs:annotation>
274
+ </xs:enumeration>
275
+ <xs:enumeration value="Malware Artifacts">
276
+ <xs:annotation>
277
+ <xs:documentation>Indicator describes the effects of suspected malware.</xs:documentation>
278
+ </xs:annotation>
279
+ </xs:enumeration>
280
+ <xs:enumeration value="C2">
281
+ <xs:annotation>
282
+ <xs:documentation>Indicator describes suspected command and control activity or static indications.</xs:documentation>
283
+ </xs:annotation>
284
+ </xs:enumeration>
285
+ <xs:enumeration value="Anonymization">
286
+ <xs:annotation>
287
+ <xs:documentation>Indicator describes suspected anonymization techniques (Proxy, TOR, VPN, etc.).</xs:documentation>
288
+ </xs:annotation>
289
+ </xs:enumeration>
290
+ <xs:enumeration value="Exfiltration">
291
+ <xs:annotation>
292
+ <xs:documentation>Indicator describes suspected exfiltration techniques or behavior.</xs:documentation>
293
+ </xs:annotation>
294
+ </xs:enumeration>
295
+ <xs:enumeration value="Host Characteristics">
296
+ <xs:annotation>
297
+ <xs:documentation>Indicator describes suspected malicious host characteristics.</xs:documentation>
298
+ </xs:annotation>
299
+ </xs:enumeration>
300
+ <xs:enumeration value="Compromised PKI Certificate">
301
+ <xs:annotation>
302
+ <xs:documentation>Indicator describes a compromised PKI Certificate.</xs:documentation>
303
+ </xs:annotation>
304
+ </xs:enumeration>
305
+ <xs:enumeration value="Login Name">
306
+ <xs:annotation>
307
+ <xs:documentation>Indicator describes a compromised Login Name.</xs:documentation>
308
+ </xs:annotation>
309
+ </xs:enumeration>
310
+ <xs:enumeration value="IMEI Watchlist">
311
+ <xs:annotation>
312
+ <xs:documentation>Indicator describes a watchlist for IMEI (handset) identifiers.</xs:documentation>
313
+ </xs:annotation>
314
+ </xs:enumeration>
315
+ <xs:enumeration value="IMSI Watchlist">
316
+ <xs:annotation>
317
+ <xs:documentation>Indicator describes a watchlist for IMSI (SIM card) identifiers.</xs:documentation>
318
+ </xs:annotation>
319
+ </xs:enumeration>
320
+ </xs:restriction>
321
+ </xs:simpleType>
322
+ <xs:complexType name="IndicatorTypeVocab-1.0">
323
+ <xs:annotation>
324
+ <xs:documentation>
325
+ The IndicatorTypeVocab is the default STIX vocabulary for expressing indicator types.
326
+ </xs:documentation>
327
+ <xs:documentation>NOTE: As of STIX Version 1.1, this version of the IndicatorTypeVocab is deprecated. Please use IndicatorTypeVocab-1.1 instead.</xs:documentation>
328
+ <xs:appinfo>
329
+ <deprecated>true</deprecated>
330
+ </xs:appinfo>
331
+ </xs:annotation>
332
+ <xs:simpleContent>
333
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
334
+ <xs:simpleType>
335
+ <xs:union memberTypes="stixVocabs:IndicatorTypeEnum-1.0"/>
336
+ </xs:simpleType>
337
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Indicator Type Vocabulary"/>
338
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#IndicatorTypeVocab-1.0"/>
339
+ </xs:restriction>
340
+ </xs:simpleContent>
341
+ </xs:complexType>
342
+ <xs:simpleType name="IndicatorTypeEnum-1.0">
343
+ <xs:annotation>
344
+ <xs:documentation>The default set of Indicator types to use for characterizing Indicators in STIX.</xs:documentation>
345
+ <xs:documentation>NOTE: As of STIX Version 1.1, this version of the IndicatorTypeEnum is deprecated. Please use IndicatorTypeEnum-1.1 instead.</xs:documentation>
346
+ <xs:appinfo>
347
+ <version>1.0</version>
348
+ <deprecated>true</deprecated>
349
+ </xs:appinfo>
350
+ </xs:annotation>
351
+ <xs:restriction base="xs:string">
352
+ <xs:enumeration value="Malicious E-mail">
353
+ <xs:annotation>
354
+ <xs:documentation>Indicator describes suspected malicious e-mail (phishing, spear phishing, infected, etc.).</xs:documentation>
355
+ </xs:annotation>
356
+ </xs:enumeration>
357
+ <xs:enumeration value="IP Watchlist">
358
+ <xs:annotation>
359
+ <xs:documentation>Indicator describes a set of suspected malicious IP addresses or IP blocks.</xs:documentation>
360
+ </xs:annotation>
361
+ </xs:enumeration>
362
+ <xs:enumeration value="File Hash Watchlist">
363
+ <xs:annotation>
364
+ <xs:documentation>Indicator describes a set of hashes for suspected malicious files.</xs:documentation>
365
+ </xs:annotation>
366
+ </xs:enumeration>
367
+ <xs:enumeration value="Domain Watchlist">
368
+ <xs:annotation>
369
+ <xs:documentation>Indicator describes a set of suspected malicious domains.</xs:documentation>
370
+ </xs:annotation>
371
+ </xs:enumeration>
372
+ <xs:enumeration value="URL Watchlist">
373
+ <xs:annotation>
374
+ <xs:documentation>Indicator describes a set of suspected malicious URLS.</xs:documentation>
375
+ </xs:annotation>
376
+ </xs:enumeration>
377
+ <xs:enumeration value="Malware Artifacts">
378
+ <xs:annotation>
379
+ <xs:documentation>Indicator describes the effects of suspected malware.</xs:documentation>
380
+ </xs:annotation>
381
+ </xs:enumeration>
382
+ <xs:enumeration value="C2">
383
+ <xs:annotation>
384
+ <xs:documentation>Indicator describes suspected command and control activity or static indications.</xs:documentation>
385
+ </xs:annotation>
386
+ </xs:enumeration>
387
+ <xs:enumeration value="Anonymization">
388
+ <xs:annotation>
389
+ <xs:documentation>Indicator describes suspected anonymization techniques (Proxy, TOR, VPN, etc.).</xs:documentation>
390
+ </xs:annotation>
391
+ </xs:enumeration>
392
+ <xs:enumeration value="Exfiltration">
393
+ <xs:annotation>
394
+ <xs:documentation>Indicator describes suspected exfiltration techniques or behavior.</xs:documentation>
395
+ </xs:annotation>
396
+ </xs:enumeration>
397
+ <xs:enumeration value="Host Characteristics">
398
+ <xs:annotation>
399
+ <xs:documentation>Indicator describes suspected malicious host characteristics.</xs:documentation>
400
+ </xs:annotation>
401
+ </xs:enumeration>
402
+ </xs:restriction>
403
+ </xs:simpleType>
404
+ <!-- COA Stage Vocabulary -->
405
+ <xs:complexType name="COAStageVocab-1.0">
406
+ <xs:annotation>
407
+ <xs:documentation>The COAStageVocab is the default STIX vocabulary for expressing the stages of the threat management lifecycle that a COA is applicable to.</xs:documentation>
408
+ </xs:annotation>
409
+ <xs:simpleContent>
410
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
411
+ <xs:simpleType>
412
+ <xs:union memberTypes="stixVocabs:COAStageEnum-1.0"/>
413
+ </xs:simpleType>
414
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default COA Stages Vocabulary"/>
415
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#COAStageVocab-1.0"/>
416
+ </xs:restriction>
417
+ </xs:simpleContent>
418
+ </xs:complexType>
419
+ <xs:simpleType name="COAStageEnum-1.0">
420
+ <xs:annotation>
421
+ <xs:documentation>The default set of stages of the threat management lifecycle that a COA may be applicable to.</xs:documentation>
422
+ <xs:appinfo>
423
+ <version>1.0</version>
424
+ </xs:appinfo>
425
+ </xs:annotation>
426
+ <xs:restriction base="xs:string">
427
+ <xs:enumeration value="Remedy">
428
+ <xs:annotation>
429
+ <xs:documentation>This COA is applicable to the "Remedy" stage of the threat management lifecycle, meaning it may be applied proactively to prevent future threats.</xs:documentation>
430
+ </xs:annotation>
431
+ </xs:enumeration>
432
+ <xs:enumeration value="Response">
433
+ <xs:annotation>
434
+ <xs:documentation>This COA is applicable to the "Response" stage of the threat management lifecycle, meaning it may be applied as an immediate reaction to an ongoing threat.</xs:documentation>
435
+ </xs:annotation>
436
+ </xs:enumeration>
437
+ </xs:restriction>
438
+ </xs:simpleType>
439
+ <!-- Campaign Status Vocabulary -->
440
+ <xs:complexType name="CampaignStatusVocab-1.0">
441
+ <xs:annotation>
442
+ <xs:documentation>The CampaignStatusVocab is the default STIX vocabulary for expressing the status of a campaign.</xs:documentation>
443
+ </xs:annotation>
444
+ <xs:simpleContent>
445
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
446
+ <xs:simpleType>
447
+ <xs:union memberTypes="stixVocabs:CampaignStatusEnum-1.0"/>
448
+ </xs:simpleType>
449
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Campaign Status Vocabulary"/>
450
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#CampaignStatusVocab-1.0"/>
451
+ </xs:restriction>
452
+ </xs:simpleContent>
453
+ </xs:complexType>
454
+ <xs:simpleType name="CampaignStatusEnum-1.0">
455
+ <xs:annotation>
456
+ <xs:documentation>The default list of possible statuses that a campaign might have.</xs:documentation>
457
+ <xs:appinfo>
458
+ <version>1.0</version>
459
+ </xs:appinfo>
460
+ </xs:annotation>
461
+ <xs:restriction base="xs:string">
462
+ <xs:enumeration value="Ongoing">
463
+ <xs:annotation>
464
+ <xs:documentation>This campaign is currently taking place.</xs:documentation>
465
+ </xs:annotation>
466
+ </xs:enumeration>
467
+ <xs:enumeration value="Historic">
468
+ <xs:annotation>
469
+ <xs:documentation>This campaign occurred in the past and is currently not taking place.</xs:documentation>
470
+ </xs:annotation>
471
+ </xs:enumeration>
472
+ <xs:enumeration value="Future">
473
+ <xs:annotation>
474
+ <xs:documentation>This campaign is expected to take place in the future.</xs:documentation>
475
+ </xs:annotation>
476
+ </xs:enumeration>
477
+ </xs:restriction>
478
+ </xs:simpleType>
479
+ <!-- Incident Status Vocabulary -->
480
+ <xs:complexType name="IncidentStatusVocab-1.0">
481
+ <xs:annotation>
482
+ <xs:documentation>The IncidentStatusVocab is the default STIX vocabulary for expressing the status of an incident.</xs:documentation>
483
+ </xs:annotation>
484
+ <xs:simpleContent>
485
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
486
+ <xs:simpleType>
487
+ <xs:union memberTypes="stixVocabs:IncidentStatusEnum-1.0"/>
488
+ </xs:simpleType>
489
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Incident Status Vocabulary"/>
490
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#IncidentStatusVocab-1.0"/>
491
+ </xs:restriction>
492
+ </xs:simpleContent>
493
+ </xs:complexType>
494
+ <xs:simpleType name="IncidentStatusEnum-1.0">
495
+ <xs:annotation>
496
+ <xs:documentation>The default list of possible statuses that an incident might have.</xs:documentation>
497
+ <xs:appinfo>
498
+ <version>1.0</version>
499
+ </xs:appinfo>
500
+ </xs:annotation>
501
+ <xs:restriction base="xs:string">
502
+ <xs:enumeration value="New"/>
503
+ <xs:enumeration value="Open"/>
504
+ <xs:enumeration value="Stalled"/>
505
+ <xs:enumeration value="Containment Achieved"/>
506
+ <xs:enumeration value="Restoration Achieved"/>
507
+ <xs:enumeration value="Incident Reported"/>
508
+ <xs:enumeration value="Closed"/>
509
+ <xs:enumeration value="Rejected"/>
510
+ <xs:enumeration value="Deleted"/>
511
+ </xs:restriction>
512
+ </xs:simpleType>
513
+ <!-- Enumerations from VERIS -->
514
+ <!-- Security Compromise Vocabulary -->
515
+ <xs:complexType name="SecurityCompromiseVocab-1.0">
516
+ <xs:annotation>
517
+ <xs:documentation>The SecurityCompromiseVocab is the default STIX vocabulary for expressing whether or not an incident resulted in a security compromise.</xs:documentation>
518
+ </xs:annotation>
519
+ <xs:simpleContent>
520
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
521
+ <xs:simpleType>
522
+ <xs:union memberTypes="stixVocabs:SecurityCompromiseEnum-1.0"/>
523
+ </xs:simpleType>
524
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Security Compromise Vocabulary"/>
525
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#SecurityCompromiseVocab-1.0"/>
526
+ </xs:restriction>
527
+ </xs:simpleContent>
528
+ </xs:complexType>
529
+ <xs:simpleType name="SecurityCompromiseEnum-1.0">
530
+ <xs:annotation>
531
+ <xs:documentation>
532
+ The possible values for expressing whether an incident resulted in a security compromise.
533
+ </xs:documentation>
534
+ <xs:appinfo>
535
+ <version>1.0</version>
536
+ <source>This vocabulary is a part of the VERIS framework and is used with their permission.</source>
537
+ </xs:appinfo>
538
+ </xs:annotation>
539
+ <xs:restriction base="xs:string">
540
+ <xs:enumeration value="Yes">
541
+ <xs:annotation>
542
+ <xs:documentation>It has been confirmed that this incident resulted in a security compromise.</xs:documentation>
543
+ </xs:annotation>
544
+ </xs:enumeration>
545
+ <xs:enumeration value="Suspected">
546
+ <xs:annotation>
547
+ <xs:documentation>It is suspected that this incident resulted in a security compromise.</xs:documentation>
548
+ </xs:annotation>
549
+ </xs:enumeration>
550
+ <xs:enumeration value="No">
551
+ <xs:annotation>
552
+ <xs:documentation>It has been confirmed that this incident did not result in a security compromise.</xs:documentation>
553
+ </xs:annotation>
554
+ </xs:enumeration>
555
+ <xs:enumeration value="Unknown">
556
+ <xs:annotation>
557
+ <xs:documentation>It is not known whether this incident resulted in a security compromise.</xs:documentation>
558
+ </xs:annotation>
559
+ </xs:enumeration>
560
+ </xs:restriction>
561
+ </xs:simpleType>
562
+ <!-- Discovery Method Vocabulary -->
563
+ <xs:complexType name="DiscoveryMethodVocab-1.0">
564
+ <xs:annotation>
565
+ <xs:documentation>The DiscoveryMethodVocab is the default STIX vocabulary for expressing how an incident was discovered.</xs:documentation>
566
+ </xs:annotation>
567
+ <xs:simpleContent>
568
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
569
+ <xs:simpleType>
570
+ <xs:union memberTypes="stixVocabs:DiscoveryMethodEnum-1.0"/>
571
+ </xs:simpleType>
572
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Discovery Method Vocabulary"/>
573
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#DiscoveryMethodVocab-1.0"/>
574
+ </xs:restriction>
575
+ </xs:simpleContent>
576
+ </xs:complexType>
577
+ <xs:simpleType name="DiscoveryMethodEnum-1.0">
578
+ <xs:annotation>
579
+ <xs:documentation>
580
+ The possible values for expressing how an incident was discovered.
581
+ </xs:documentation>
582
+ <xs:appinfo>
583
+ <version>1.0</version>
584
+ <source>This vocabulary is a part of the VERIS framework and is used with their permission.</source>
585
+ </xs:appinfo>
586
+ </xs:annotation>
587
+ <xs:restriction base="xs:string">
588
+ <xs:enumeration value="Agent Disclosure">
589
+ <xs:annotation>
590
+ <xs:documentation>This incident was disclosed by the threat agent (e.g. public brag, private blackmail).</xs:documentation>
591
+ </xs:annotation>
592
+ </xs:enumeration>
593
+ <xs:enumeration value="Fraud Detection">
594
+ <xs:annotation>
595
+ <xs:documentation>This incident was discovered through external fraud detection means (e.g. CPP).</xs:documentation>
596
+ </xs:annotation>
597
+ </xs:enumeration>
598
+ <xs:enumeration value="Monitoring Service">
599
+ <xs:annotation>
600
+ <xs:documentation>This incident was reported by a managed security event monitoring service.</xs:documentation>
601
+ </xs:annotation>
602
+ </xs:enumeration>
603
+ <xs:enumeration value="Law Enforcement">
604
+ <xs:annotation>
605
+ <xs:documentation>This incident was reported by law enforcement.</xs:documentation>
606
+ </xs:annotation>
607
+ </xs:enumeration>
608
+ <xs:enumeration value="Customer">
609
+ <xs:annotation>
610
+ <xs:documentation>This incident was reported by a customer or partner affected by the incident.</xs:documentation>
611
+ </xs:annotation>
612
+ </xs:enumeration>
613
+ <xs:enumeration value="Unrelated Party">
614
+ <xs:annotation>
615
+ <xs:documentation>This incident was reported by an unrelated third party.</xs:documentation>
616
+ </xs:annotation>
617
+ </xs:enumeration>
618
+ <xs:enumeration value="Audit">
619
+ <xs:annotation>
620
+ <xs:documentation>This incident was discovered during an external security audit or scan.</xs:documentation>
621
+ </xs:annotation>
622
+ </xs:enumeration>
623
+ <xs:enumeration value="Antivirus">
624
+ <xs:annotation>
625
+ <xs:documentation>This incident was discovered by an antivirus system.</xs:documentation>
626
+ </xs:annotation>
627
+ </xs:enumeration>
628
+ <xs:enumeration value="Incident Response">
629
+ <xs:annotation>
630
+ <xs:documentation>This incident was discovered in the course of investigating a separate incident.</xs:documentation>
631
+ </xs:annotation>
632
+ </xs:enumeration>
633
+ <xs:enumeration value="Financial Audit">
634
+ <xs:annotation>
635
+ <xs:documentation>This incident was discovered in the course of a financial audit and/or reconciliation process.</xs:documentation>
636
+ </xs:annotation>
637
+ </xs:enumeration>
638
+ <xs:enumeration value="Fraud Detection">
639
+ <xs:annotation>
640
+ <xs:documentation>This incident was discovered through internal fraud detection means.</xs:documentation>
641
+ </xs:annotation>
642
+ </xs:enumeration>
643
+ <xs:enumeration value="HIPS">
644
+ <xs:annotation>
645
+ <xs:documentation>This incident was discovered a host-based IDS or file integrity monitoring.</xs:documentation>
646
+ </xs:annotation>
647
+ </xs:enumeration>
648
+ <xs:enumeration value="IT Audit">
649
+ <xs:annotation>
650
+ <xs:documentation>This incident was discovered by an internal IT audit or scan.</xs:documentation>
651
+ </xs:annotation>
652
+ </xs:enumeration>
653
+ <xs:enumeration value="Log Review">
654
+ <xs:annotation>
655
+ <xs:documentation>This incident was discovered during a log review process or by a SIEM.</xs:documentation>
656
+ </xs:annotation>
657
+ </xs:enumeration>
658
+ <xs:enumeration value="NIDS">
659
+ <xs:annotation>
660
+ <xs:documentation>This incident was discovered by a network-based intrustion detection/prevention system.</xs:documentation>
661
+ </xs:annotation>
662
+ </xs:enumeration>
663
+ <xs:enumeration value="Security Alarm">
664
+ <xs:annotation>
665
+ <xs:documentation>This incident was discovered by a physical security alarm.</xs:documentation>
666
+ </xs:annotation>
667
+ </xs:enumeration>
668
+ <xs:enumeration value="User">
669
+ <xs:annotation>
670
+ <xs:documentation>This incident was reported by a user.</xs:documentation>
671
+ </xs:annotation>
672
+ </xs:enumeration>
673
+ <xs:enumeration value="Unknown">
674
+ <xs:annotation>
675
+ <xs:documentation>It is not known how this incident was discovered.</xs:documentation>
676
+ </xs:annotation>
677
+ </xs:enumeration>
678
+ </xs:restriction>
679
+ </xs:simpleType>
680
+ <!-- Availability Loss Type Vocabulary -->
681
+ <xs:complexType name="AvailabilityLossTypeVocab-1.1.1">
682
+ <xs:annotation>
683
+ <xs:documentation>The AvailabilityLossTypeVocab is the default STIX vocabulary for expressing the type of availability that was lost due to an incident.</xs:documentation>
684
+ </xs:annotation>
685
+ <xs:simpleContent>
686
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
687
+ <xs:simpleType>
688
+ <xs:union memberTypes="stixVocabs:AvailabilityLossTypeEnum-1.1.1"/>
689
+ </xs:simpleType>
690
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Availability Loss Type Vocabulary"/>
691
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.1/stix_default_vocabularies.xsd#AvailabilityLossTypeVocab-1.1.1"/>
692
+ </xs:restriction>
693
+ </xs:simpleContent>
694
+ </xs:complexType>
695
+ <xs:simpleType name="AvailabilityLossTypeEnum-1.1.1">
696
+ <xs:annotation>
697
+ <xs:documentation>
698
+ The possible values for expressing the type of availability that was lost due to an incident.
699
+ </xs:documentation>
700
+ <xs:appinfo>
701
+ <version>1.0</version>
702
+ <source>This vocabulary is a part of the VERIS framework and is used with their permission.</source>
703
+ </xs:appinfo>
704
+ </xs:annotation>
705
+ <xs:restriction base="xs:string">
706
+ <xs:enumeration value="Destruction">
707
+ <xs:annotation>
708
+ <xs:documentation>The information was destroyed or wiped.</xs:documentation>
709
+ </xs:annotation>
710
+ </xs:enumeration>
711
+ <xs:enumeration value="Loss">
712
+ <xs:annotation>
713
+ <xs:documentation>Availability to the information was lost.</xs:documentation>
714
+ </xs:annotation>
715
+ </xs:enumeration>
716
+ <xs:enumeration value="Interruption">
717
+ <xs:annotation>
718
+ <xs:documentation>Availability to the information was interrupted.</xs:documentation>
719
+ </xs:annotation>
720
+ </xs:enumeration>
721
+ <xs:enumeration value="Degradation">
722
+ <xs:annotation>
723
+ <xs:documentation>Availability to the information was degraded.</xs:documentation>
724
+ </xs:annotation>
725
+ </xs:enumeration>
726
+ <xs:enumeration value="Acceleration">
727
+ <xs:annotation>
728
+ <xs:documentation>Availability loss type is acceleration.</xs:documentation>
729
+ </xs:annotation>
730
+ </xs:enumeration>
731
+ <xs:enumeration value="Obscuration">
732
+ <xs:annotation>
733
+ <xs:documentation>Availability to the information is obscured.</xs:documentation>
734
+ </xs:annotation>
735
+ </xs:enumeration>
736
+ <xs:enumeration value="Unknown">
737
+ <xs:annotation>
738
+ <xs:documentation>The availability loss type is not known.</xs:documentation>
739
+ </xs:annotation>
740
+ </xs:enumeration>
741
+ </xs:restriction>
742
+ </xs:simpleType>
743
+ <xs:complexType name="AvailabilityLossTypeVocab-1.0">
744
+ <xs:annotation>
745
+ <xs:documentation>The AvailabilityLossTypeVocab is the default STIX vocabulary for expressing the type of availability that was lost due to an incident.</xs:documentation>
746
+ <xs:documentation>NOTE: As of STIX Version 1.1.1, this version of the AvailabilityLossTypeVocab is deprecated. Please use AvailabilityLossTypeVocab-1.1.1 instead.</xs:documentation>
747
+ <xs:appinfo>
748
+ <deprecated>true</deprecated>
749
+ </xs:appinfo>
750
+ </xs:annotation>
751
+ <xs:simpleContent>
752
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
753
+ <xs:simpleType>
754
+ <xs:union memberTypes="stixVocabs:AvailabilityLossTypeEnum-1.0"/>
755
+ </xs:simpleType>
756
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Availability Loss Type Vocabulary"/>
757
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#AvailabilityLossTypeVocab-1.0"/>
758
+ </xs:restriction>
759
+ </xs:simpleContent>
760
+ </xs:complexType>
761
+ <xs:simpleType name="AvailabilityLossTypeEnum-1.0">
762
+ <xs:annotation>
763
+ <xs:documentation>
764
+ The possible values for expressing the type of availability that was lost due to an incident.
765
+ </xs:documentation>
766
+ <xs:appinfo>
767
+ <version>1.0</version>
768
+ <source>This vocabulary is a part of the VERIS framework and is used with their permission.</source>
769
+ </xs:appinfo>
770
+ </xs:annotation>
771
+ <xs:restriction base="xs:string">
772
+ <xs:enumeration value="Destruction">
773
+ <xs:annotation>
774
+ <xs:documentation>The information was destroyed or wiped.</xs:documentation>
775
+ </xs:annotation>
776
+ </xs:enumeration>
777
+ <xs:enumeration value="Loss">
778
+ <xs:annotation>
779
+ <xs:documentation>Availability to the information was lost.</xs:documentation>
780
+ </xs:annotation>
781
+ </xs:enumeration>
782
+ <xs:enumeration value="Interruption">
783
+ <xs:annotation>
784
+ <xs:documentation>Availability to the information was interrupted.</xs:documentation>
785
+ </xs:annotation>
786
+ </xs:enumeration>
787
+ <xs:enumeration value="Degredation">
788
+ <xs:annotation>
789
+ <xs:documentation>Availability to the information was degraded.</xs:documentation>
790
+ </xs:annotation>
791
+ </xs:enumeration>
792
+ <xs:enumeration value="Acceleration">
793
+ <xs:annotation>
794
+ <xs:documentation>Availability loss type is acceleration.</xs:documentation>
795
+ </xs:annotation>
796
+ </xs:enumeration>
797
+ <xs:enumeration value="Obscuration">
798
+ <xs:annotation>
799
+ <xs:documentation>Availability to the information is obscured.</xs:documentation>
800
+ </xs:annotation>
801
+ </xs:enumeration>
802
+ <xs:enumeration value="Unknown">
803
+ <xs:annotation>
804
+ <xs:documentation>The availability loss type is not known.</xs:documentation>
805
+ </xs:annotation>
806
+ </xs:enumeration>
807
+ </xs:restriction>
808
+ </xs:simpleType>
809
+ <!-- Loss Duration Vocabulary -->
810
+ <xs:complexType name="LossDurationVocab-1.0">
811
+ <xs:annotation>
812
+ <xs:documentation>The LossDurationVocab is the default STIX vocabulary for expressing the approximate length of time of a loss due to an incident.</xs:documentation>
813
+ </xs:annotation>
814
+ <xs:simpleContent>
815
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
816
+ <xs:simpleType>
817
+ <xs:union memberTypes="stixVocabs:LossDurationEnum-1.0"/>
818
+ </xs:simpleType>
819
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Loss Duration Vocabulary"/>
820
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#LossDurationVocab-1.0"/>
821
+ </xs:restriction>
822
+ </xs:simpleContent>
823
+ </xs:complexType>
824
+ <xs:simpleType name="LossDurationEnum-1.0">
825
+ <xs:annotation>
826
+ <xs:documentation>
827
+ The possible values for expressing the type of availability that was lost due to an incident.
828
+ </xs:documentation>
829
+ <xs:appinfo>
830
+ <version>1.0</version>
831
+ </xs:appinfo>
832
+ </xs:annotation>
833
+ <xs:restriction base="xs:string">
834
+ <xs:enumeration value="Permanent">
835
+ <xs:annotation>
836
+ <xs:documentation>The loss is permanent.</xs:documentation>
837
+ </xs:annotation>
838
+ </xs:enumeration>
839
+ <xs:enumeration value="Weeks">
840
+ <xs:annotation>
841
+ <xs:documentation>The loss lasted for weeks.</xs:documentation>
842
+ </xs:annotation>
843
+ </xs:enumeration>
844
+ <xs:enumeration value="Days">
845
+ <xs:annotation>
846
+ <xs:documentation>The loss lasted for days.</xs:documentation>
847
+ </xs:annotation>
848
+ </xs:enumeration>
849
+ <xs:enumeration value="Hours">
850
+ <xs:annotation>
851
+ <xs:documentation>The loss lasted for hours.</xs:documentation>
852
+ </xs:annotation>
853
+ </xs:enumeration>
854
+ <xs:enumeration value="Minutes">
855
+ <xs:annotation>
856
+ <xs:documentation>The loss lasted for minutes.</xs:documentation>
857
+ </xs:annotation>
858
+ </xs:enumeration>
859
+ <xs:enumeration value="Seconds">
860
+ <xs:annotation>
861
+ <xs:documentation>The loss lasted for seconds.</xs:documentation>
862
+ </xs:annotation>
863
+ </xs:enumeration>
864
+ <xs:enumeration value="Unknown">
865
+ <xs:annotation>
866
+ <xs:documentation>The loss duration is not known.</xs:documentation>
867
+ </xs:annotation>
868
+ </xs:enumeration>
869
+ </xs:restriction>
870
+ </xs:simpleType>
871
+ <!-- Ownership Class Vocabulary -->
872
+ <xs:complexType name="OwnershipClassVocab-1.0">
873
+ <xs:annotation>
874
+ <xs:documentation>The OwnershipClassVocab is the default STIX vocabulary for expressing the type of ownership of an asset.</xs:documentation>
875
+ </xs:annotation>
876
+ <xs:simpleContent>
877
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
878
+ <xs:simpleType>
879
+ <xs:union memberTypes="stixVocabs:OwnershipClassEnum-1.0"/>
880
+ </xs:simpleType>
881
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Ownership Class Vocabulary"/>
882
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#OwnershipClassVocab-1.0"/>
883
+ </xs:restriction>
884
+ </xs:simpleContent>
885
+ </xs:complexType>
886
+ <xs:simpleType name="OwnershipClassEnum-1.0">
887
+ <xs:annotation>
888
+ <xs:documentation>
889
+ The possible values for expressing the ownership class of an object.
890
+ </xs:documentation>
891
+ <xs:appinfo>
892
+ <version>1.0</version>
893
+ </xs:appinfo>
894
+ </xs:annotation>
895
+ <xs:restriction base="xs:string">
896
+ <xs:enumeration value="Internally-Owned">
897
+ <xs:annotation>
898
+ <xs:documentation>The asset is owned internally.</xs:documentation>
899
+ </xs:annotation>
900
+ </xs:enumeration>
901
+ <xs:enumeration value="Employee-Owned">
902
+ <xs:annotation>
903
+ <xs:documentation>The asset is owned by an employee.</xs:documentation>
904
+ </xs:annotation>
905
+ </xs:enumeration>
906
+ <xs:enumeration value="Partner-Owned">
907
+ <xs:annotation>
908
+ <xs:documentation>The asset is owned by a partner.</xs:documentation>
909
+ </xs:annotation>
910
+ </xs:enumeration>
911
+ <xs:enumeration value="Customer-Owned">
912
+ <xs:annotation>
913
+ <xs:documentation>The asset is owned by a customer.</xs:documentation>
914
+ </xs:annotation>
915
+ </xs:enumeration>
916
+ <xs:enumeration value="Unknown">
917
+ <xs:annotation>
918
+ <xs:documentation>The asset ownership class is unknown.</xs:documentation>
919
+ </xs:annotation>
920
+ </xs:enumeration>
921
+ </xs:restriction>
922
+ </xs:simpleType>
923
+ <!-- Management Class Vocabulary -->
924
+ <xs:complexType name="ManagementClassVocab-1.0">
925
+ <xs:annotation>
926
+ <xs:documentation>The ManagementClassVocab is the default STIX vocabulary for expressing the type of management of an asset.</xs:documentation>
927
+ </xs:annotation>
928
+ <xs:simpleContent>
929
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
930
+ <xs:simpleType>
931
+ <xs:union memberTypes="stixVocabs:ManagementClassEnum-1.0"/>
932
+ </xs:simpleType>
933
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Management Class Vocabulary"/>
934
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#ManagementClassVocab-1.0"/>
935
+ </xs:restriction>
936
+ </xs:simpleContent>
937
+ </xs:complexType>
938
+ <xs:simpleType name="ManagementClassEnum-1.0">
939
+ <xs:annotation>
940
+ <xs:documentation>
941
+ The possible values for expressing the management class of an object.
942
+ </xs:documentation>
943
+ <xs:appinfo>
944
+ <version>1.0</version>
945
+ </xs:appinfo>
946
+ </xs:annotation>
947
+ <xs:restriction base="xs:string">
948
+ <xs:enumeration value="Internally-Managed">
949
+ <xs:annotation>
950
+ <xs:documentation>The asset is managed internally.</xs:documentation>
951
+ </xs:annotation>
952
+ </xs:enumeration>
953
+ <xs:enumeration value="Externally-Management">
954
+ <xs:annotation>
955
+ <xs:documentation>The asset is managed externally.</xs:documentation>
956
+ </xs:annotation>
957
+ </xs:enumeration>
958
+ <xs:enumeration value="Co-Management">
959
+ <xs:annotation>
960
+ <xs:documentation>The asset is co-managed.</xs:documentation>
961
+ </xs:annotation>
962
+ </xs:enumeration>
963
+ <xs:enumeration value="Unknown">
964
+ <xs:annotation>
965
+ <xs:documentation>The asset management class is unknown.</xs:documentation>
966
+ </xs:annotation>
967
+ </xs:enumeration>
968
+ </xs:restriction>
969
+ </xs:simpleType>
970
+ <!-- Location Class Vocabulary -->
971
+ <xs:complexType name="LocationClassVocab-1.0">
972
+ <xs:annotation>
973
+ <xs:documentation>The LocationClassVocab is the default STIX vocabulary for expressing the location of an asset.</xs:documentation>
974
+ </xs:annotation>
975
+ <xs:simpleContent>
976
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
977
+ <xs:simpleType>
978
+ <xs:union memberTypes="stixVocabs:LocationClassEnum-1.0"/>
979
+ </xs:simpleType>
980
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Location Class Vocabulary"/>
981
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#LocationClassVocab-1.0"/>
982
+ </xs:restriction>
983
+ </xs:simpleContent>
984
+ </xs:complexType>
985
+ <xs:simpleType name="LocationClassEnum-1.0">
986
+ <xs:annotation>
987
+ <xs:documentation>
988
+ The possible values for expressing the location class of an object.
989
+ </xs:documentation>
990
+ <xs:appinfo>
991
+ <version>1.0</version>
992
+ </xs:appinfo>
993
+ </xs:annotation>
994
+ <xs:restriction base="xs:string">
995
+ <xs:enumeration value="Internally-Located">
996
+ <xs:annotation>
997
+ <xs:documentation>The asset is located internally.</xs:documentation>
998
+ </xs:annotation>
999
+ </xs:enumeration>
1000
+ <xs:enumeration value="Externally-Located">
1001
+ <xs:annotation>
1002
+ <xs:documentation>The asset is located externally.</xs:documentation>
1003
+ </xs:annotation>
1004
+ </xs:enumeration>
1005
+ <xs:enumeration value="Co-Located">
1006
+ <xs:annotation>
1007
+ <xs:documentation>The asset is co-located.</xs:documentation>
1008
+ </xs:annotation>
1009
+ </xs:enumeration>
1010
+ <xs:enumeration value="Mobile">
1011
+ <xs:annotation>
1012
+ <xs:documentation>The asset is mobile.</xs:documentation>
1013
+ </xs:annotation>
1014
+ </xs:enumeration>
1015
+ <xs:enumeration value="Unknown">
1016
+ <xs:annotation>
1017
+ <xs:documentation>The asset location is unknown.</xs:documentation>
1018
+ </xs:annotation>
1019
+ </xs:enumeration>
1020
+ </xs:restriction>
1021
+ </xs:simpleType>
1022
+ <!-- Impact Qualification Vocabulary -->
1023
+ <xs:complexType name="ImpactQualificationVocab-1.0">
1024
+ <xs:annotation>
1025
+ <xs:documentation>The ImpactQualificationVocab is the default STIX vocabulary for expressing the subjective level of impact of an incident.</xs:documentation>
1026
+ </xs:annotation>
1027
+ <xs:simpleContent>
1028
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1029
+ <xs:simpleType>
1030
+ <xs:union memberTypes="stixVocabs:ImpactQualificationEnum-1.0"/>
1031
+ </xs:simpleType>
1032
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Impact Qualification Vocabulary"/>
1033
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#ImpactQualificationVocab-1.0"/>
1034
+ </xs:restriction>
1035
+ </xs:simpleContent>
1036
+ </xs:complexType>
1037
+ <xs:simpleType name="ImpactQualificationEnum-1.0">
1038
+ <xs:annotation>
1039
+ <xs:documentation>
1040
+ The possible values for expressing the impact level of an incident.
1041
+ </xs:documentation>
1042
+ <xs:appinfo>
1043
+ <version>1.0</version>
1044
+ <source>This vocabulary is a part of the VERIS framework and is used with their permission.</source>
1045
+ </xs:appinfo>
1046
+ </xs:annotation>
1047
+ <xs:restriction base="xs:string">
1048
+ <xs:enumeration value="Insignificant">
1049
+ <xs:annotation>
1050
+ <xs:documentation>The impact is absorbed by normal activities.</xs:documentation>
1051
+ </xs:annotation>
1052
+ </xs:enumeration>
1053
+ <xs:enumeration value="Distracting">
1054
+ <xs:annotation>
1055
+ <xs:documentation>There are limited “hard costs”, but the impact is felt through having to deal with the incident rather than conducting normal duties.</xs:documentation>
1056
+ </xs:annotation>
1057
+ </xs:enumeration>
1058
+ <xs:enumeration value="Painful">
1059
+ <xs:annotation>
1060
+ <xs:documentation>Real, somewhat serious effect on the "bottom line".</xs:documentation>
1061
+ </xs:annotation>
1062
+ </xs:enumeration>
1063
+ <xs:enumeration value="Damaging">
1064
+ <xs:annotation>
1065
+ <xs:documentation>Real and serious effect on the “bottom line” and/or long-term ability to generate revenue.</xs:documentation>
1066
+ </xs:annotation>
1067
+ </xs:enumeration>
1068
+ <xs:enumeration value="Catastrophic">
1069
+ <xs:annotation>
1070
+ <xs:documentation>A business-ending event.</xs:documentation>
1071
+ </xs:annotation>
1072
+ </xs:enumeration>
1073
+ <xs:enumeration value="Unknown">
1074
+ <xs:annotation>
1075
+ <xs:documentation>The impact qualification is unknown.</xs:documentation>
1076
+ </xs:annotation>
1077
+ </xs:enumeration>
1078
+ </xs:restriction>
1079
+ </xs:simpleType>
1080
+ <!-- Impact Rating Vocabulary -->
1081
+ <xs:complexType name="ImpactRatingVocab-1.0">
1082
+ <xs:annotation>
1083
+ <xs:documentation>The ImpactRatingVocab is the default STIX vocabulary for expressing the level of impact due to an incident.</xs:documentation>
1084
+ </xs:annotation>
1085
+ <xs:simpleContent>
1086
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1087
+ <xs:simpleType>
1088
+ <xs:union memberTypes="stixVocabs:ImpactRatingEnum-1.0"/>
1089
+ </xs:simpleType>
1090
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Impact Rating Vocabulary"/>
1091
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#ImpactRatingVocab-1.0"/>
1092
+ </xs:restriction>
1093
+ </xs:simpleContent>
1094
+ </xs:complexType>
1095
+ <xs:simpleType name="ImpactRatingEnum-1.0">
1096
+ <xs:annotation>
1097
+ <xs:documentation>
1098
+ The possible values for expressing the level of impact due to a loss.
1099
+ </xs:documentation>
1100
+ <xs:appinfo>
1101
+ <version>1.0</version>
1102
+ <source>This vocabulary is a part of the VERIS framework and is used with their permission.</source>
1103
+ </xs:appinfo>
1104
+ </xs:annotation>
1105
+ <xs:restriction base="xs:string">
1106
+ <xs:enumeration value="None">
1107
+ <xs:annotation>
1108
+ <xs:documentation>There was no impact.</xs:documentation>
1109
+ </xs:annotation>
1110
+ </xs:enumeration>
1111
+ <xs:enumeration value="Minor">
1112
+ <xs:annotation>
1113
+ <xs:documentation>There was a minor impact.</xs:documentation>
1114
+ </xs:annotation>
1115
+ </xs:enumeration>
1116
+ <xs:enumeration value="Moderate">
1117
+ <xs:annotation>
1118
+ <xs:documentation>There was a moderate impact.</xs:documentation>
1119
+ </xs:annotation>
1120
+ </xs:enumeration>
1121
+ <xs:enumeration value="Major">
1122
+ <xs:annotation>
1123
+ <xs:documentation>There was a major impact.</xs:documentation>
1124
+ </xs:annotation>
1125
+ </xs:enumeration>
1126
+ <xs:enumeration value="Unknown">
1127
+ <xs:annotation>
1128
+ <xs:documentation>The impact is not known.</xs:documentation>
1129
+ </xs:annotation>
1130
+ </xs:enumeration>
1131
+ </xs:restriction>
1132
+ </xs:simpleType>
1133
+ <!-- Asset Type Vocabulary -->
1134
+ <xs:complexType name="AssetTypeVocab-1.0">
1135
+ <xs:annotation>
1136
+ <xs:documentation>The AssetTypeVocab is the default STIX vocabulary for expressing the type of an asset.</xs:documentation>
1137
+ </xs:annotation>
1138
+ <xs:simpleContent>
1139
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1140
+ <xs:simpleType>
1141
+ <xs:union memberTypes="stixVocabs:AssetTypeEnum-1.0"/>
1142
+ </xs:simpleType>
1143
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Asset Type Vocabulary"/>
1144
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#AssetTypeVocab-1.0"/>
1145
+ </xs:restriction>
1146
+ </xs:simpleContent>
1147
+ </xs:complexType>
1148
+ <xs:simpleType name="AssetTypeEnum-1.0">
1149
+ <xs:annotation>
1150
+ <xs:documentation>
1151
+ The possible values for types of assets.
1152
+ </xs:documentation>
1153
+ <xs:appinfo>
1154
+ <version>1.0</version>
1155
+ <source>This vocabulary is a part of the VERIS framework and is used with their permission.</source>
1156
+ </xs:appinfo>
1157
+ </xs:annotation>
1158
+ <xs:restriction base="xs:string">
1159
+ <xs:enumeration value="Backup"/>
1160
+ <xs:enumeration value="Database"/>
1161
+ <xs:enumeration value="DHCP"/>
1162
+ <xs:enumeration value="Directory"/>
1163
+ <xs:enumeration value="DCS"/>
1164
+ <xs:enumeration value="DNS"/>
1165
+ <xs:enumeration value="File"/>
1166
+ <xs:enumeration value="Log"/>
1167
+ <xs:enumeration value="Mail"/>
1168
+ <xs:enumeration value="Mainframe"/>
1169
+ <xs:enumeration value="Payment switch"/>
1170
+ <xs:enumeration value="POS controller"/>
1171
+ <xs:enumeration value="Print"/>
1172
+ <xs:enumeration value="Proxy"/>
1173
+ <xs:enumeration value="Remote access"/>
1174
+ <xs:enumeration value="SCADA"/>
1175
+ <xs:enumeration value="Web application"/>
1176
+ <xs:enumeration value="Server"/>
1177
+ <xs:enumeration value="Access reader"/>
1178
+ <xs:enumeration value="Camera"/>
1179
+ <xs:enumeration value="Firewall"/>
1180
+ <xs:enumeration value="HSM"/>
1181
+ <xs:enumeration value="IDS"/>
1182
+ <xs:enumeration value="Broadband"/>
1183
+ <xs:enumeration value="PBX"/>
1184
+ <xs:enumeration value="Private WAN"/>
1185
+ <xs:enumeration value="PLC"/>
1186
+ <xs:enumeration value="Public WAN"/>
1187
+ <xs:enumeration value="RTU"/>
1188
+ <xs:enumeration value="Router or switch"/>
1189
+ <xs:enumeration value="SAN"/>
1190
+ <xs:enumeration value="Telephone"/>
1191
+ <xs:enumeration value="VoIP adapter"/>
1192
+ <xs:enumeration value="LAN"/>
1193
+ <xs:enumeration value="WLAN"/>
1194
+ <xs:enumeration value="Network"/>
1195
+ <xs:enumeration value="Auth token"/>
1196
+ <xs:enumeration value="ATM"/>
1197
+ <xs:enumeration value="Desktop"/>
1198
+ <xs:enumeration value="PED pad"/>
1199
+ <xs:enumeration value="Gas terminal"/>
1200
+ <xs:enumeration value="Laptop"/>
1201
+ <xs:enumeration value="Media"/>
1202
+ <xs:enumeration value="Mobile phone"/>
1203
+ <xs:enumeration value="Peripheral"/>
1204
+ <xs:enumeration value="POS terminal"/>
1205
+ <xs:enumeration value="Kiosk"/>
1206
+ <xs:enumeration value="Tablet"/>
1207
+ <xs:enumeration value="Telephone"/>
1208
+ <xs:enumeration value="VoIP phone"/>
1209
+ <xs:enumeration value="User Device"/>
1210
+ <xs:enumeration value="Tapes"/>
1211
+ <xs:enumeration value="Disk media"/>
1212
+ <xs:enumeration value="Documents"/>
1213
+ <xs:enumeration value="Flash drive"/>
1214
+ <xs:enumeration value="Disk drive"/>
1215
+ <xs:enumeration value="Smart card"/>
1216
+ <xs:enumeration value="Payment card"/>
1217
+ <xs:enumeration value="Media"/>
1218
+ <xs:enumeration value="Administrator"/>
1219
+ <xs:enumeration value="Auditor"/>
1220
+ <xs:enumeration value="Call center"/>
1221
+ <xs:enumeration value="Cashier"/>
1222
+ <xs:enumeration value="Customer"/>
1223
+ <xs:enumeration value="Developer"/>
1224
+ <xs:enumeration value="End-user"/>
1225
+ <xs:enumeration value="Executive"/>
1226
+ <xs:enumeration value="Finance"/>
1227
+ <xs:enumeration value="Former employee"/>
1228
+ <xs:enumeration value="Guard"/>
1229
+ <xs:enumeration value="Helpdesk"/>
1230
+ <xs:enumeration value="Human resources"/>
1231
+ <xs:enumeration value="Maintenance"/>
1232
+ <xs:enumeration value="Manager"/>
1233
+ <xs:enumeration value="Partner"/>
1234
+ <xs:enumeration value="Person"/>
1235
+ <xs:enumeration value="Unknown"/>
1236
+ </xs:restriction>
1237
+ </xs:simpleType>
1238
+ <!-- Attacker Infrastructure Vocabulary -->
1239
+ <xs:complexType name="AttackerInfrastructureTypeVocab-1.0">
1240
+ <xs:annotation>
1241
+ <xs:documentation>The AttackerInfrastructureTypeVocab is the default STIX vocabulary for expressing the type of infrastructure an attacker uses.</xs:documentation>
1242
+ </xs:annotation>
1243
+ <xs:simpleContent>
1244
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1245
+ <xs:simpleType>
1246
+ <xs:union memberTypes="stixVocabs:AttackerInfrastructureTypeEnum-1.0"/>
1247
+ </xs:simpleType>
1248
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Attacker Infastructure Type Vocabulary"/>
1249
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#AttackerInfrastructureTypeVocab-1.0"/>
1250
+ </xs:restriction>
1251
+ </xs:simpleContent>
1252
+ </xs:complexType>
1253
+ <xs:simpleType name="AttackerInfrastructureTypeEnum-1.0">
1254
+ <xs:annotation>
1255
+ <xs:documentation>
1256
+ The possible values for types of attacker infrastructure.
1257
+ </xs:documentation>
1258
+ <xs:appinfo>
1259
+ <version>1.0</version>
1260
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1261
+ </xs:appinfo>
1262
+ </xs:annotation>
1263
+ <xs:restriction base="xs:string">
1264
+ <xs:enumeration value="Anonymization"/>
1265
+ <xs:enumeration value="Anonymization - Proxy"/>
1266
+ <xs:enumeration value="Anonymization - TOR Network"/>
1267
+ <xs:enumeration value="Anonymization - VPN"/>
1268
+ <xs:enumeration value="Communications"/>
1269
+ <xs:enumeration value="Communications - Blogs"/>
1270
+ <xs:enumeration value="Communications - Forums"/>
1271
+ <xs:enumeration value="Communications - Internet Relay Chat"/>
1272
+ <xs:enumeration value="Communications - Micro-Blogs"/>
1273
+ <xs:enumeration value="Communications - Mobile Communications"/>
1274
+ <xs:enumeration value="Communications - Social Networks"/>
1275
+ <xs:enumeration value="Communications - User-Generated Content Websites"/>
1276
+ <xs:enumeration value="Domain Registration"/>
1277
+ <xs:enumeration value="Domain Registration - Dynamic DNS Services"/>
1278
+ <xs:enumeration value="Domain Registration - Legitimate Domain Registration Services"/>
1279
+ <xs:enumeration value="Domain Registration - Malicious Domain Registrars"/>
1280
+ <xs:enumeration value="Domain Registration - Top-Level Domain Registrars"/>
1281
+ <xs:enumeration value="Hosting"/>
1282
+ <xs:enumeration value="Hosting - Bulletproof / Rogue Hosting"/>
1283
+ <xs:enumeration value="Hosting - Cloud Hosting"/>
1284
+ <xs:enumeration value="Hosting - Compromised Server"/>
1285
+ <xs:enumeration value="Hosting - Fast Flux Botnet Hosting"/>
1286
+ <xs:enumeration value="Hosting - Legitimate Hosting"/>
1287
+ <xs:enumeration value="Electronic Payment Methods"/>
1288
+ </xs:restriction>
1289
+ </xs:simpleType>
1290
+ <!-- System Type Vocabulary -->
1291
+ <xs:complexType name="SystemTypeVocab-1.0">
1292
+ <xs:annotation>
1293
+ <xs:documentation>The SystemTypeVocab is the default STIX vocabulary for expressing the type of a system.</xs:documentation>
1294
+ </xs:annotation>
1295
+ <xs:simpleContent>
1296
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1297
+ <xs:simpleType>
1298
+ <xs:union memberTypes="stixVocabs:SystemTypeEnum-1.0"/>
1299
+ </xs:simpleType>
1300
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default System Type Vocabulary"/>
1301
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#SystemTypeVocab-1.0"/>
1302
+ </xs:restriction>
1303
+ </xs:simpleContent>
1304
+ </xs:complexType>
1305
+ <xs:simpleType name="SystemTypeEnum-1.0">
1306
+ <xs:annotation>
1307
+ <xs:documentation>
1308
+ The possible values for types of systems.
1309
+ </xs:documentation>
1310
+ <xs:appinfo>
1311
+ <version>1.0</version>
1312
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1313
+ </xs:appinfo>
1314
+ </xs:annotation>
1315
+ <xs:restriction base="xs:string">
1316
+ <xs:enumeration value="Enterprise Systems"/>
1317
+ <xs:enumeration value="Enterprise Systems - Application Layer"/>
1318
+ <xs:enumeration value="Enterprise Systems - Database Layer"/>
1319
+ <xs:enumeration value="Enterprise Systems - Enterprise Technologies and Support Infrastructure"/>
1320
+ <xs:enumeration value="Enterprise Systems - Network Systems"/>
1321
+ <xs:enumeration value="Enterprise Systems - Networking Devices"/>
1322
+ <xs:enumeration value="Enterprise Systems - Web Layer"/>
1323
+ <xs:enumeration value="Enterprise Systems - VoIP"/>
1324
+ <xs:enumeration value="Industrial Control Systems"/>
1325
+ <xs:enumeration value="Industrial Control Systems - Equipment Under Control"/>
1326
+ <xs:enumeration value="Industrial Control Systems - Operations Management"/>
1327
+ <xs:enumeration value="Industrial Control Systems - Safety, Protection and Local Control"/>
1328
+ <xs:enumeration value="Industrial Control Systems - Supervisory Control"/>
1329
+ <xs:enumeration value="Mobile Systems"/>
1330
+ <xs:enumeration value="Mobile Systems - Mobile Operating Systems"/>
1331
+ <xs:enumeration value="Mobile Systems - Near Field Communications"/>
1332
+ <xs:enumeration value="Mobile Systems - Mobile Devices"/>
1333
+ <xs:enumeration value="Third-Party Services"/>
1334
+ <xs:enumeration value="Third-Party Services - Application Stores"/>
1335
+ <xs:enumeration value="Third-Party Services - Cloud Services"/>
1336
+ <xs:enumeration value="Third-Party Services - Security Vendors"/>
1337
+ <xs:enumeration value="Third-Party Services - Social Media"/>
1338
+ <xs:enumeration value="Third-Party Services - Software Update"/>
1339
+ <xs:enumeration value="Users"/>
1340
+ <xs:enumeration value="Users - Application And Software"/>
1341
+ <xs:enumeration value="Users - Workstation"/>
1342
+ <xs:enumeration value="Users - Removable Media"/>
1343
+ </xs:restriction>
1344
+ </xs:simpleType>
1345
+ <!-- Information Type Vocabulary -->
1346
+ <xs:complexType name="InformationTypeVocab-1.0">
1347
+ <xs:annotation>
1348
+ <xs:documentation>The InformationTypeVocab is the default STIX vocabulary for expressing the type of information.</xs:documentation>
1349
+ </xs:annotation>
1350
+ <xs:simpleContent>
1351
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1352
+ <xs:simpleType>
1353
+ <xs:union memberTypes="stixVocabs:InformationTypeEnum-1.0"/>
1354
+ </xs:simpleType>
1355
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Information Type Vocabulary"/>
1356
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#InformationTypeVocab-1.0"/>
1357
+ </xs:restriction>
1358
+ </xs:simpleContent>
1359
+ </xs:complexType>
1360
+ <xs:simpleType name="InformationTypeEnum-1.0">
1361
+ <xs:annotation>
1362
+ <xs:documentation>
1363
+ The possible values for types of information.
1364
+ </xs:documentation>
1365
+ <xs:appinfo>
1366
+ <version>1.0</version>
1367
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1368
+ </xs:appinfo>
1369
+ </xs:annotation>
1370
+ <xs:restriction base="xs:string">
1371
+ <xs:enumeration value="Information Assets"/>
1372
+ <xs:enumeration value="Information Assets - Corporate Employee Information"/>
1373
+ <xs:enumeration value="Information Assets - Customer PII"/>
1374
+ <xs:enumeration value="Information Assets - Email Lists / Archives"/>
1375
+ <xs:enumeration value="Information Assets - Financial Data"/>
1376
+ <xs:enumeration value="Information Assets - Intellectual Property"/>
1377
+ <xs:enumeration value="Information Assets - Mobile Phone Contacts"/>
1378
+ <xs:enumeration value="Information Assets - User Credentials"/>
1379
+ <xs:enumeration value="Authentication Cookies"/>
1380
+ </xs:restriction>
1381
+ </xs:simpleType>
1382
+ <!-- Threat Actor Type Vocabulary -->
1383
+ <xs:complexType name="ThreatActorTypeVocab-1.0">
1384
+ <xs:annotation>
1385
+ <xs:documentation>The ThreatActorTypeVocab is the default STIX vocabulary for expressing the type of a threat actor.</xs:documentation>
1386
+ </xs:annotation>
1387
+ <xs:simpleContent>
1388
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1389
+ <xs:simpleType>
1390
+ <xs:union memberTypes="stixVocabs:ThreatActorTypeEnum-1.0"/>
1391
+ </xs:simpleType>
1392
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Threat Actor Type Vocabulary"/>
1393
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#ThreatActorTypeVocab-1.0"/>
1394
+ </xs:restriction>
1395
+ </xs:simpleContent>
1396
+ </xs:complexType>
1397
+ <xs:simpleType name="ThreatActorTypeEnum-1.0">
1398
+ <xs:annotation>
1399
+ <xs:documentation>
1400
+ The possible values for types of threat actors.
1401
+ </xs:documentation>
1402
+ <xs:appinfo>
1403
+ <version>1.0</version>
1404
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1405
+ </xs:appinfo>
1406
+ </xs:annotation>
1407
+ <xs:restriction base="xs:string">
1408
+ <xs:enumeration value="Cyber Espionage Operations"/>
1409
+ <xs:enumeration value="Hacker"/>
1410
+ <xs:enumeration value="Hacker - White hat"/>
1411
+ <xs:enumeration value="Hacker - Gray hat"/>
1412
+ <xs:enumeration value="Hacker - Black hat"/>
1413
+ <xs:enumeration value="Hacktivist"/>
1414
+ <xs:enumeration value="State Actor / Agency"/>
1415
+ <xs:enumeration value="eCrime Actor - Credential Theft Botnet Operator"/>
1416
+ <xs:enumeration value="eCrime Actor - Credential Theft Botnet Service"/>
1417
+ <xs:enumeration value="eCrime Actor - Malware Developer"/>
1418
+ <xs:enumeration value="eCrime Actor - Money Laundering Network"/>
1419
+ <xs:enumeration value="eCrime Actor - Organized Crime Actor"/>
1420
+ <xs:enumeration value="eCrime Actor - Spam Service"/>
1421
+ <xs:enumeration value="eCrime Actor - Traffic Service"/>
1422
+ <xs:enumeration value="eCrime Actor - Underground Call Service"/>
1423
+ <xs:enumeration value="Insider Threat"/>
1424
+ <xs:enumeration value="Disgruntled Customer / User"/>
1425
+ </xs:restriction>
1426
+ </xs:simpleType>
1427
+ <!-- Motivation Vocabulary -->
1428
+ <xs:complexType name="MotivationVocab-1.1">
1429
+ <xs:annotation>
1430
+ <xs:documentation>The MotivationVocab is the default STIX vocabulary for expressing the motivation of a threat actor.</xs:documentation>
1431
+ </xs:annotation>
1432
+ <xs:simpleContent>
1433
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1434
+ <xs:simpleType>
1435
+ <xs:union memberTypes="stixVocabs:MotivationEnum-1.1"/>
1436
+ </xs:simpleType>
1437
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Motivation Vocabulary"/>
1438
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#MotivationVocab-1.1"/>
1439
+ </xs:restriction>
1440
+ </xs:simpleContent>
1441
+ </xs:complexType>
1442
+ <xs:simpleType name="MotivationEnum-1.1">
1443
+ <xs:annotation>
1444
+ <xs:documentation>
1445
+ The possible values for motivations of a threat actor.
1446
+ </xs:documentation>
1447
+ <xs:appinfo>
1448
+ <version>1.1</version>
1449
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1450
+ </xs:appinfo>
1451
+ </xs:annotation>
1452
+ <xs:restriction base="xs:string">
1453
+ <xs:enumeration value="Ideological"/>
1454
+ <xs:enumeration value="Ideological - Anti-Corruption"/>
1455
+ <xs:enumeration value="Ideological - Anti-Establishment"/>
1456
+ <xs:enumeration value="Ideological - Environmental"/>
1457
+ <xs:enumeration value="Ideological - Ethnic / Nationalist"/>
1458
+ <xs:enumeration value="Ideological - Information Freedom"/>
1459
+ <xs:enumeration value="Ideological - Religious"/>
1460
+ <xs:enumeration value="Ideological - Security Awareness"/>
1461
+ <xs:enumeration value="Ideological - Human Rights"/>
1462
+ <xs:enumeration value="Ego"/>
1463
+ <xs:enumeration value="Financial or Economic"/>
1464
+ <xs:enumeration value="Military"/>
1465
+ <xs:enumeration value="Opportunistic"/>
1466
+ <xs:enumeration value="Political"/>
1467
+ </xs:restriction>
1468
+ </xs:simpleType>
1469
+ <xs:complexType name="MotivationVocab-1.0.1">
1470
+ <xs:annotation>
1471
+ <xs:documentation>The MotivationVocab is the default STIX vocabulary for expressing the motivation of a threat actor.</xs:documentation>
1472
+ <xs:documentation>NOTE: As of STIX Version 1.1, this version of the MotivationVocab is deprecated. Please use MotivationVocab-1.1 instead.</xs:documentation>
1473
+ <xs:appinfo>
1474
+ <deprecated>true</deprecated>
1475
+ </xs:appinfo>
1476
+ </xs:annotation>
1477
+ <xs:simpleContent>
1478
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1479
+ <xs:simpleType>
1480
+ <xs:union memberTypes="stixVocabs:MotivationEnum-1.0.1"/>
1481
+ </xs:simpleType>
1482
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Motivation Vocabulary"/>
1483
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#MotivationVocab-1.0.1"/>
1484
+ </xs:restriction>
1485
+ </xs:simpleContent>
1486
+ </xs:complexType>
1487
+ <xs:simpleType name="MotivationEnum-1.0.1">
1488
+ <xs:annotation>
1489
+ <xs:documentation>
1490
+ The possible values for motivations of a threat actor.
1491
+ </xs:documentation>
1492
+ <xs:documentation>NOTE: As of STIX Version 1.1, this version of the MotivationEnum is deprecated. Please use MotivationEnum-1.1 instead.</xs:documentation>
1493
+ <xs:appinfo>
1494
+ <version>1.0.1</version>
1495
+ <deprecated>true</deprecated>
1496
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1497
+ </xs:appinfo>
1498
+ </xs:annotation>
1499
+ <xs:restriction base="xs:string">
1500
+ <xs:enumeration value="Ideological"/>
1501
+ <xs:enumeration value="Ideological - Anti-Corruption"/>
1502
+ <xs:enumeration value="Ideological - Anti-Establishment"/>
1503
+ <xs:enumeration value="Ideological - Environmental"/>
1504
+ <xs:enumeration value="Ideological - Ethnic / Nationalist"/>
1505
+ <xs:enumeration value="Ideological - Information Freedom"/>
1506
+ <xs:enumeration value="Ideological - Religious"/>
1507
+ <xs:enumeration value="Ideological - Security Awareness"/>
1508
+ <xs:enumeration value="Ideological - Human Rights"/>
1509
+ <xs:enumeration value="Ego"/>
1510
+ <xs:enumeration value="Financial or Economic"/>
1511
+ <xs:enumeration value="Military"/>
1512
+ <xs:enumeration value="Opportunistic"/>
1513
+ <xs:enumeration value="Policital"/>
1514
+ </xs:restriction>
1515
+ </xs:simpleType>
1516
+ <xs:complexType name="MotivationVocab-1.0">
1517
+ <xs:annotation>
1518
+ <xs:documentation>The MotivationVocab is the default STIX vocabulary for expressing the motivation of a threat actor.</xs:documentation>
1519
+ <xs:documentation>NOTE: As of STIX Version 1.0.1, this version of the MotivationVocab is deprecated. Please use MotivationVocab-1.0.1 instead.</xs:documentation>
1520
+ <xs:appinfo>
1521
+ <deprecated>true</deprecated>
1522
+ </xs:appinfo>
1523
+ </xs:annotation>
1524
+ <xs:simpleContent>
1525
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1526
+ <xs:simpleType>
1527
+ <xs:union memberTypes="stixVocabs:MotivationEnum-1.0"/>
1528
+ </xs:simpleType>
1529
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Motivation Vocabulary"/>
1530
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#MotivationVocab-1.0"/>
1531
+ </xs:restriction>
1532
+ </xs:simpleContent>
1533
+ </xs:complexType>
1534
+ <xs:simpleType name="MotivationEnum-1.0">
1535
+ <xs:annotation>
1536
+ <xs:documentation>The possible values for motivations of a threat actor.</xs:documentation>
1537
+ <xs:documentation>NOTE: As of STIX Version 1.0.1, this version of the MotivationEnum is deprecated. Please use MotivationEnum-1.0.1 instead.</xs:documentation>
1538
+ <xs:appinfo>
1539
+ <version>1.0</version>
1540
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1541
+ <deprecated>true</deprecated>
1542
+ </xs:appinfo>
1543
+ </xs:annotation>
1544
+ <xs:restriction base="xs:string">
1545
+ <xs:enumeration value="Ideological"/>
1546
+ <xs:enumeration value="Ideological - Anti-Corruption"/>
1547
+ <xs:enumeration value="Ideological - Anti-Establisment"/>
1548
+ <xs:enumeration value="Ideological - Environmental"/>
1549
+ <xs:enumeration value="Ideological - Ethnic / Nationalist"/>
1550
+ <xs:enumeration value="Ideological - Information Freedom"/>
1551
+ <xs:enumeration value="Ideological - Religious"/>
1552
+ <xs:enumeration value="Ideological - Security Awareness"/>
1553
+ <xs:enumeration value="Ideological - Human Rights"/>
1554
+ <xs:enumeration value="Ego"/>
1555
+ <xs:enumeration value="Financial or Economic"/>
1556
+ <xs:enumeration value="Military"/>
1557
+ <xs:enumeration value="Opportunistic"/>
1558
+ <xs:enumeration value="Policital"/>
1559
+ </xs:restriction>
1560
+ </xs:simpleType>
1561
+ <!-- Intended Effect Vocabulary -->
1562
+ <xs:complexType name="IntendedEffectVocab-1.0">
1563
+ <xs:annotation>
1564
+ <xs:documentation>The IntendedEffectVocab is the default STIX vocabulary for expressing the intended effect of a threat actor.</xs:documentation>
1565
+ </xs:annotation>
1566
+ <xs:simpleContent>
1567
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1568
+ <xs:simpleType>
1569
+ <xs:union memberTypes="stixVocabs:IntendedEffectEnum-1.0"/>
1570
+ </xs:simpleType>
1571
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Intended Effect Vocabulary"/>
1572
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#IntendedEffectVocab-1.0"/>
1573
+ </xs:restriction>
1574
+ </xs:simpleContent>
1575
+ </xs:complexType>
1576
+ <xs:simpleType name="IntendedEffectEnum-1.0">
1577
+ <xs:annotation>
1578
+ <xs:documentation>The possible values for effects intended by a threat actor.</xs:documentation>
1579
+ <xs:appinfo>
1580
+ <version>1.0</version>
1581
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1582
+ </xs:appinfo>
1583
+ </xs:annotation>
1584
+ <xs:restriction base="xs:string">
1585
+ <xs:enumeration value="Advantage"/>
1586
+ <xs:enumeration value="Advantage - Economic"/>
1587
+ <xs:enumeration value="Advantage - Military"/>
1588
+ <xs:enumeration value="Advantage - Political"/>
1589
+ <xs:enumeration value="Theft"/>
1590
+ <xs:enumeration value="Theft - Intellectual Property"/>
1591
+ <xs:enumeration value="Theft - Credential Theft"/>
1592
+ <xs:enumeration value="Theft - Identity Theft"/>
1593
+ <xs:enumeration value="Theft - Theft of Proprietary Information"/>
1594
+ <xs:enumeration value="Account Takeover"/>
1595
+ <xs:enumeration value="Brand Damage"/>
1596
+ <xs:enumeration value="Competitive Advantage"/>
1597
+ <xs:enumeration value="Degradation of Service"/>
1598
+ <xs:enumeration value="Denial and Deception"/>
1599
+ <xs:enumeration value="Destruction"/>
1600
+ <xs:enumeration value="Disruption"/>
1601
+ <xs:enumeration value="Embarrassment"/>
1602
+ <xs:enumeration value="Exposure"/>
1603
+ <xs:enumeration value="Extortion"/>
1604
+ <xs:enumeration value="Fraud"/>
1605
+ <xs:enumeration value="Harassment"/>
1606
+ <xs:enumeration value="ICS Control"/>
1607
+ <xs:enumeration value="Traffic Diversion"/>
1608
+ <xs:enumeration value="Unauthorized Access"/>
1609
+ </xs:restriction>
1610
+ </xs:simpleType>
1611
+ <!-- Planning and Operational Support Vocabulary -->
1612
+ <xs:complexType name="PlanningAndOperationalSupportVocab-1.0.1">
1613
+ <xs:annotation>
1614
+ <xs:documentation>The PlanningAndOperationalSupportVocab is the default STIX vocabulary for expressing the planning and operational support functions of a threat actor.</xs:documentation>
1615
+ </xs:annotation>
1616
+ <xs:simpleContent>
1617
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1618
+ <xs:simpleType>
1619
+ <xs:union memberTypes="stixVocabs:PlanningAndOperationalSupportEnum-1.0.1"/>
1620
+ </xs:simpleType>
1621
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Planning and Operational Support Vocabulary"/>
1622
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#PlanningAndOperationalSupportVocab-1.0.1"/>
1623
+ </xs:restriction>
1624
+ </xs:simpleContent>
1625
+ </xs:complexType>
1626
+ <xs:simpleType name="PlanningAndOperationalSupportEnum-1.0.1">
1627
+ <xs:annotation>
1628
+ <xs:documentation>The possible values for types of planning and operational support functions of a threat actor.</xs:documentation>
1629
+ <xs:appinfo>
1630
+ <version>1.0</version>
1631
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1632
+ </xs:appinfo>
1633
+ </xs:annotation>
1634
+ <xs:restriction base="xs:string">
1635
+ <xs:enumeration value="Data Exploitation"/>
1636
+ <xs:enumeration value="Data Exploitation - Analytic Support"/>
1637
+ <xs:enumeration value="Data Exploitation - Translation Support"/>
1638
+ <xs:enumeration value="Financial Resources"/>
1639
+ <xs:enumeration value="Financial Resources - Academic"/>
1640
+ <xs:enumeration value="Financial Resources - Commercial"/>
1641
+ <xs:enumeration value="Financial Resources - Government"/>
1642
+ <xs:enumeration value="Financial Resources - Hacktivist or Grassroot"/>
1643
+ <xs:enumeration value="Financial Resources - Non-Attributable Finance"/>
1644
+ <xs:enumeration value="Skill Development / Recruitment"/>
1645
+ <xs:enumeration value="Skill Development / Recruitment - Contracting and Hiring"/>
1646
+ <xs:enumeration value="Skill Development / Recruitment - Document Exploitation (DOCEX) Training"/>
1647
+ <xs:enumeration value="Skill Development / Recruitment - Internal Training"/>
1648
+ <xs:enumeration value="Skill Development / Recruitment - Military Programs"/>
1649
+ <xs:enumeration value="Skill Development / Recruitment - Security / Hacker Conferences"/>
1650
+ <xs:enumeration value="Skill Development / Recruitment - Underground Forums"/>
1651
+ <xs:enumeration value="Skill Development / Recruitment - University Programs"/>
1652
+ <xs:enumeration value="Planning"/>
1653
+ <xs:enumeration value="Planning - Operational Cover Plan"/>
1654
+ <xs:enumeration value="Planning - Open-Source Intelligence (OSINT) Gathering"/>
1655
+ <xs:enumeration value="Planning - Pre-Operational Surveillance and Reconnaissance"/>
1656
+ <xs:enumeration value="Planning - Target Selection"/>
1657
+ </xs:restriction>
1658
+ </xs:simpleType>
1659
+ <xs:complexType name="PlanningAndOperationalSupportVocab-1.0">
1660
+ <xs:annotation>
1661
+ <xs:documentation>The PlanningAndOperationalSupportVocab is the default STIX vocabulary for expressing the planning and operational support functions of a threat actor.</xs:documentation>
1662
+ <xs:documentation>NOTE: As of STIX Version 1.0.1, this version of the PlanningAndOperationalSupportVocab is deprecated. Please use PlanningAndOperationalSupportVocab-1.0.1 instead.</xs:documentation>
1663
+ <xs:appinfo>
1664
+ <deprecated>true</deprecated>
1665
+ </xs:appinfo>
1666
+ </xs:annotation>
1667
+ <xs:simpleContent>
1668
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1669
+ <xs:simpleType>
1670
+ <xs:union memberTypes="stixVocabs:PlanningAndOperationalSupportEnum-1.0"/>
1671
+ </xs:simpleType>
1672
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Planning and Operational Support Vocabulary"/>
1673
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#PlanningAndOperationalSupportVocab-1.0"/>
1674
+ </xs:restriction>
1675
+ </xs:simpleContent>
1676
+ </xs:complexType>
1677
+ <xs:simpleType name="PlanningAndOperationalSupportEnum-1.0">
1678
+ <xs:annotation>
1679
+ <xs:documentation>The possible values for types of planning and operational support functions of a threat actor.</xs:documentation>
1680
+ <xs:documentation>NOTE: As of STIX Version 1.0.1, this version of the PlanningAndOperationalSupportEnumType is deprecated. Please use PlanningAndOperationalSupportEnum-1.0.1 instead.</xs:documentation>
1681
+ <xs:appinfo>
1682
+ <version>1.0</version>
1683
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1684
+ <deprecated>true</deprecated>
1685
+ </xs:appinfo>
1686
+ </xs:annotation>
1687
+ <xs:restriction base="xs:string">
1688
+ <xs:enumeration value="Data Exploitation"/>
1689
+ <xs:enumeration value="Data Exploitation - Analytic Support"/>
1690
+ <xs:enumeration value="Data Exploitation - Translation Support"/>
1691
+ <xs:enumeration value="Financial Resources"/>
1692
+ <xs:enumeration value="Financial Resources - Academic"/>
1693
+ <xs:enumeration value="Financial Resources - Commercial"/>
1694
+ <xs:enumeration value="Financial Resources - Government"/>
1695
+ <xs:enumeration value="Financial Resources - Hacktivist or Grassroot"/>
1696
+ <xs:enumeration value="Financial Resources - Non-Attributable Finance"/>
1697
+ <xs:enumeration value="Skill Development / Recruitment"/>
1698
+ <xs:enumeration value="Skill Development / Recruitment - Contracting and Hiring"/>
1699
+ <xs:enumeration value="Skill Development / Recruitment - Document Exploitation (DOCEX) Training"/>
1700
+ <xs:enumeration value="Skill Development / Recruitment - Internal Training"/>
1701
+ <xs:enumeration value="Skill Development / Recruitment - Military Programs"/>
1702
+ <xs:enumeration value="Skill Development / Recruitment - Security / Hacker Conferences"/>
1703
+ <xs:enumeration value="Skill Development / Recruitment - Underground Forums"/>
1704
+ <xs:enumeration value="Skill Development / Recruitment - University Programs"/>
1705
+ <xs:enumeration value="Planning "/>
1706
+ <xs:enumeration value="Planning - Operational Cover Plan"/>
1707
+ <xs:enumeration value="Planning - Open-Source Intelligence (OSINT) Gethering"/>
1708
+ <xs:enumeration value="Planning - Pre-Operational Surveillance and Reconnaissance"/>
1709
+ <xs:enumeration value="Planning - Target Selection"/>
1710
+ </xs:restriction>
1711
+ </xs:simpleType>
1712
+ <!-- Incident Effect Vocabulary -->
1713
+ <xs:complexType name="IncidentEffectVocab-1.0">
1714
+ <xs:annotation>
1715
+ <xs:documentation>The IncidentEffectVocab is the default STIX vocabulary for expressing the possible effects of an incident.</xs:documentation>
1716
+ </xs:annotation>
1717
+ <xs:simpleContent>
1718
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1719
+ <xs:simpleType>
1720
+ <xs:union memberTypes="stixVocabs:IncidentEffectEnum-1.0"/>
1721
+ </xs:simpleType>
1722
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Incident Effect Vocabulary"/>
1723
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#IncidentEffectVocab-1.0"/>
1724
+ </xs:restriction>
1725
+ </xs:simpleContent>
1726
+ </xs:complexType>
1727
+ <xs:simpleType name="IncidentEffectEnum-1.0">
1728
+ <xs:annotation>
1729
+ <xs:documentation>The possible values for types of possible effects of an incident.</xs:documentation>
1730
+ <xs:appinfo>
1731
+ <version>1.0</version>
1732
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1733
+ </xs:appinfo>
1734
+ </xs:annotation>
1735
+ <xs:restriction base="xs:string">
1736
+ <xs:enumeration value="Brand or Image Degradation"/>
1737
+ <xs:enumeration value="Loss of Competitive Advantage"/>
1738
+ <xs:enumeration value="Loss of Competitive Advantage - Economic"/>
1739
+ <xs:enumeration value="Loss of Competitive Advantage - Military"/>
1740
+ <xs:enumeration value="Loss of Competitive Advantage - Political"/>
1741
+ <xs:enumeration value="Data Breach or Compromise"/>
1742
+ <xs:enumeration value="Degradation of Service"/>
1743
+ <xs:enumeration value="Destruction"/>
1744
+ <xs:enumeration value="Disruption of Service / Operations"/>
1745
+ <xs:enumeration value="Financial Loss"/>
1746
+ <xs:enumeration value="Loss of Confidential / Proprietary Information or Intellectual Property"/>
1747
+ <xs:enumeration value="Regulatory, Compliance or Legal Impact"/>
1748
+ <xs:enumeration value="Unintended Access"/>
1749
+ <xs:enumeration value="User Data Loss"/>
1750
+ </xs:restriction>
1751
+ </xs:simpleType>
1752
+ <!-- Attacker Tool Type Vocabulary -->
1753
+ <xs:complexType name="AttackerToolTypeVocab-1.0">
1754
+ <xs:annotation>
1755
+ <xs:documentation>The AttackerToolTypeVocab-1.0 is the default STIX vocabulary for expressing types of attacker tools.</xs:documentation>
1756
+ <xs:documentation>Note that this vocabulary is under development. Feedback is appreciated and should be sent to the STIX discussion list.</xs:documentation>
1757
+ </xs:annotation>
1758
+ <xs:simpleContent>
1759
+ <xs:restriction base="cyboxCommon:ControlledVocabularyStringType">
1760
+ <xs:simpleType>
1761
+ <xs:union memberTypes="stixVocabs:AttackerToolTypeEnum-1.0"/>
1762
+ </xs:simpleType>
1763
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Attacker Tool Type Vocabulary"/>
1764
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#AttackerToolTypeVocab-1.0"/>
1765
+ </xs:restriction>
1766
+ </xs:simpleContent>
1767
+ </xs:complexType>
1768
+ <xs:simpleType name="AttackerToolTypeEnum-1.0">
1769
+ <xs:annotation>
1770
+ <xs:documentation>
1771
+ The possible values for types of attacker tools.
1772
+ </xs:documentation>
1773
+ <xs:appinfo>
1774
+ <version>1.0</version>
1775
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
1776
+ </xs:appinfo>
1777
+ </xs:annotation>
1778
+ <xs:restriction base="xs:string">
1779
+ <xs:enumeration value="Malware"/>
1780
+ <xs:enumeration value="Penetration Testing"/>
1781
+ <xs:enumeration value="Port Scanner"/>
1782
+ <xs:enumeration value="Traffic Scanner"/>
1783
+ <xs:enumeration value="Vulnerability Scanner"/>
1784
+ <xs:enumeration value="Application Scanner"/>
1785
+ <xs:enumeration value="Password Cracking"/>
1786
+ </xs:restriction>
1787
+ </xs:simpleType>
1788
+ <!-- Incident Category Vocabulary -->
1789
+ <xs:complexType name="IncidentCategoryVocab-1.0">
1790
+ <xs:annotation>
1791
+ <xs:documentation>The IncidentCategoryVocab is the default STIX vocabulary for expressing the possible categories of an incident.</xs:documentation>
1792
+ </xs:annotation>
1793
+ <xs:simpleContent>
1794
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1795
+ <xs:simpleType>
1796
+ <xs:union memberTypes="stixVocabs:IncidentCategoryEnum-1.0"/>
1797
+ </xs:simpleType>
1798
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Incident Category Vocabulary"/>
1799
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#IncidentCategoryVocab-1.0"/>
1800
+ </xs:restriction>
1801
+ </xs:simpleContent>
1802
+ </xs:complexType>
1803
+ <xs:simpleType name="IncidentCategoryEnum-1.0">
1804
+ <xs:annotation>
1805
+ <xs:documentation>The possible values for types of possible categories of an incident.</xs:documentation>
1806
+ <xs:appinfo>
1807
+ <version>1.0</version>
1808
+ <source>This vocabulary is taken from the US-CERT Federal Incident Reporting Guidelines Incident Categories.</source>
1809
+ </xs:appinfo>
1810
+ </xs:annotation>
1811
+ <xs:restriction base="xs:string">
1812
+ <xs:enumeration value="Exercise/Network Defense Testing">
1813
+ <xs:annotation>
1814
+ <xs:documentation>This category is used during state, federal, national, international exercises and approved activity testing of internal/external network defenses or responses.</xs:documentation>
1815
+ </xs:annotation>
1816
+ </xs:enumeration>
1817
+ <xs:enumeration value="Unauthorized Access">
1818
+ <xs:annotation>
1819
+ <xs:documentation>In this category an individual gains logical or physical access without permission to a federal agency network, system, application, data, or other resource.</xs:documentation>
1820
+ </xs:annotation>
1821
+ </xs:enumeration>
1822
+ <xs:enumeration value="Denial of Service">
1823
+ <xs:annotation>
1824
+ <xs:documentation>An attack that successfully prevents or impairs the normal authorized functionality of networks, systems or applications by exhausting resources. This activity includes being the victim or participating in the DoS.</xs:documentation>
1825
+ </xs:annotation>
1826
+ </xs:enumeration>
1827
+ <xs:enumeration value="Malicious Code">
1828
+ <xs:annotation>
1829
+ <xs:documentation>Installation of malicious software (e.g., virus, worm, Trojan horse, or other code-based malicious entity) that infects an operating system or application. Agencies are NOT required to report malicious logic that has been successfully quarantined by antivirus (AV) software.</xs:documentation>
1830
+ </xs:annotation>
1831
+ </xs:enumeration>
1832
+ <xs:enumeration value="Improper Usage">
1833
+ <xs:annotation>
1834
+ <xs:documentation>A person violates acceptable computing use policies.</xs:documentation>
1835
+ </xs:annotation>
1836
+ </xs:enumeration>
1837
+ <xs:enumeration value="Scans/Probes/Attempted Access">
1838
+ <xs:annotation>
1839
+ <xs:documentation>This category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service, or any combination for later exploit. This activity does not directly result in a compromise or denial of service.</xs:documentation>
1840
+ </xs:annotation>
1841
+ </xs:enumeration>
1842
+ <xs:enumeration value="Investigation">
1843
+ <xs:annotation>
1844
+ <xs:documentation>Unconfirmed incidents that are potentially malicious or anomalous activity deemed by the reporting entity to warrant further review.</xs:documentation>
1845
+ </xs:annotation>
1846
+ </xs:enumeration>
1847
+ </xs:restriction>
1848
+ </xs:simpleType>
1849
+ <!-- Loss Property Vocabulary -->
1850
+ <xs:complexType name="LossPropertyVocab-1.0">
1851
+ <xs:annotation>
1852
+ <xs:documentation>The LossPropertyVocab is the default STIX vocabulary for expressing the possible properties of a loss.</xs:documentation>
1853
+ </xs:annotation>
1854
+ <xs:simpleContent>
1855
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1856
+ <xs:simpleType>
1857
+ <xs:union memberTypes="stixVocabs:LossPropertyEnum-1.0"/>
1858
+ </xs:simpleType>
1859
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Loss Property Vocabulary"/>
1860
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#LossPropertyVocab-1.0"/>
1861
+ </xs:restriction>
1862
+ </xs:simpleContent>
1863
+ </xs:complexType>
1864
+ <xs:simpleType name="LossPropertyEnum-1.0">
1865
+ <xs:annotation>
1866
+ <xs:documentation>The possible values for properties of a loss.</xs:documentation>
1867
+ <xs:appinfo>
1868
+ <version>1.0</version>
1869
+ </xs:appinfo>
1870
+ </xs:annotation>
1871
+ <xs:restriction base="xs:string">
1872
+ <xs:enumeration value="Confidentiality"/>
1873
+ <xs:enumeration value="Integrity"/>
1874
+ <xs:enumeration value="Availability"/>
1875
+ <xs:enumeration value="Accountability"/>
1876
+ <xs:enumeration value="Non-Repudiation"/>
1877
+ </xs:restriction>
1878
+ </xs:simpleType>
1879
+ <!-- Course Of Action Type Vocabulary -->
1880
+ <xs:complexType name="CourseOfActionTypeVocab-1.0">
1881
+ <xs:annotation>
1882
+ <xs:documentation>The CourseOfActionTypeVocab is the default STIX vocabulary for expressing types of courses of action.</xs:documentation>
1883
+ </xs:annotation>
1884
+ <xs:simpleContent>
1885
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1886
+ <xs:simpleType>
1887
+ <xs:union memberTypes="stixVocabs:CourseOfActionTypeEnum-1.0"/>
1888
+ </xs:simpleType>
1889
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Course Of Action Type Vocabulary"/>
1890
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#CourseOfActionTypeVocab-1.0"/>
1891
+ </xs:restriction>
1892
+ </xs:simpleContent>
1893
+ </xs:complexType>
1894
+ <xs:simpleType name="CourseOfActionTypeEnum-1.0">
1895
+ <xs:annotation>
1896
+ <xs:documentation>The default set of values to use for expressing a type of course of action in STIX.</xs:documentation>
1897
+ <xs:appinfo>
1898
+ <version>1.0</version>
1899
+ </xs:appinfo>
1900
+ </xs:annotation>
1901
+ <xs:restriction base="xs:string">
1902
+ <xs:enumeration value="Perimeter Blocking">
1903
+ <xs:annotation>
1904
+ <xs:documentation>Perimeter-based blocking of traffic from a compromised source.</xs:documentation>
1905
+ </xs:annotation>
1906
+ </xs:enumeration>
1907
+ <xs:enumeration value="Internal Blocking">
1908
+ <xs:annotation>
1909
+ <xs:documentation>Host-based blocking of traffic from an internal compromised source.</xs:documentation>
1910
+ </xs:annotation>
1911
+ </xs:enumeration>
1912
+ <xs:enumeration value="Redirection">
1913
+ <xs:annotation>
1914
+ <xs:documentation>Re-routing of suspicious or known malicious traffic away from the intended target to an area where the threat can be more safely observed and analyzed.</xs:documentation>
1915
+ </xs:annotation>
1916
+ </xs:enumeration>
1917
+ <xs:enumeration value="Redirection (Honey Pot)">
1918
+ <xs:annotation>
1919
+ <xs:documentation>Setting up a decoy parallel network that is intended to attract adversaries to the honey pot and away from the real network assets.</xs:documentation>
1920
+ </xs:annotation>
1921
+ </xs:enumeration>
1922
+ <xs:enumeration value="Hardening">
1923
+ <xs:annotation>
1924
+ <xs:documentation>Securing a system by reducing its surface of unnecessary software, usernames or logins, and running services.</xs:documentation>
1925
+ </xs:annotation>
1926
+ </xs:enumeration>
1927
+ <xs:enumeration value="Patching">
1928
+ <xs:annotation>
1929
+ <xs:documentation>A specific form of hardening, patching involves applying a code fix directly to the software with the vulnerability.</xs:documentation>
1930
+ </xs:annotation>
1931
+ </xs:enumeration>
1932
+ <xs:enumeration value="Eradication">
1933
+ <xs:annotation>
1934
+ <xs:documentation>Identifying, locating, and eliminating malware from the network.</xs:documentation>
1935
+ </xs:annotation>
1936
+ </xs:enumeration>
1937
+ <xs:enumeration value="Rebuilding">
1938
+ <xs:annotation>
1939
+ <xs:documentation>Re-installing a computing resource from a known safe source in order to ensure that the malware is no longer present on the previously compromised resource.</xs:documentation>
1940
+ </xs:annotation>
1941
+ </xs:enumeration>
1942
+ <xs:enumeration value="Training">
1943
+ <xs:annotation>
1944
+ <xs:documentation>Training users and administrators on how to identify and mitigate this type of threat.</xs:documentation>
1945
+ </xs:annotation>
1946
+ </xs:enumeration>
1947
+ <xs:enumeration value="Monitoring">
1948
+ <xs:annotation>
1949
+ <xs:documentation>Setting up network or host-based sensors to detected the presence of this threat.</xs:documentation>
1950
+ </xs:annotation>
1951
+ </xs:enumeration>
1952
+ <xs:enumeration value="Physical Access Restrictions">
1953
+ <xs:annotation>
1954
+ <xs:documentation>Activities associated with restricting physical access to computing resources.</xs:documentation>
1955
+ </xs:annotation>
1956
+ </xs:enumeration>
1957
+ <xs:enumeration value="Logical Access Restrictions">
1958
+ <xs:annotation>
1959
+ <xs:documentation>Activities associated with restricting logical access to computing resources.</xs:documentation>
1960
+ </xs:annotation>
1961
+ </xs:enumeration>
1962
+ <xs:enumeration value="Public Disclosure">
1963
+ <xs:annotation>
1964
+ <xs:documentation>Informing the public of the existence and characteristics of the threat or threat actor to influence positive change in adversary behavior.</xs:documentation>
1965
+ </xs:annotation>
1966
+ </xs:enumeration>
1967
+ <xs:enumeration value="Diplomatic Actions">
1968
+ <xs:annotation>
1969
+ <xs:documentation>Engaging in communications and relationship building with threat actors to influence positive changes in behavior.</xs:documentation>
1970
+ </xs:annotation>
1971
+ </xs:enumeration>
1972
+ <xs:enumeration value="Policy Actions">
1973
+ <xs:annotation>
1974
+ <xs:documentation>Modifications to policy that reduce the attack surface or infection vectors of malware.</xs:documentation>
1975
+ </xs:annotation>
1976
+ </xs:enumeration>
1977
+ <xs:enumeration value="Other">
1978
+ <xs:annotation>
1979
+ <xs:documentation>Other actions not covered in this list.</xs:documentation>
1980
+ </xs:annotation>
1981
+ </xs:enumeration>
1982
+ </xs:restriction>
1983
+ </xs:simpleType>
1984
+ <!-- Threat Actor Sophistication Vocabulary -->
1985
+ <xs:complexType name="ThreatActorSophisticationVocab-1.0">
1986
+ <xs:annotation>
1987
+ <xs:documentation>The ThreatActorSophisticationVocab is the default STIX vocabulary for expressing the level of sophistication of a threat actor.</xs:documentation>
1988
+ </xs:annotation>
1989
+ <xs:simpleContent>
1990
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
1991
+ <xs:simpleType>
1992
+ <xs:union memberTypes="stixVocabs:ThreatActorSophisticationEnum-1.0"/>
1993
+ </xs:simpleType>
1994
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default Threat Actor Sophistication Vocabulary"/>
1995
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#ThreatActorSophisticationVocab-1.0"/>
1996
+ </xs:restriction>
1997
+ </xs:simpleContent>
1998
+ </xs:complexType>
1999
+ <xs:simpleType name="ThreatActorSophisticationEnum-1.0">
2000
+ <xs:annotation>
2001
+ <xs:documentation>
2002
+ The possible values for threat actor sophistication.
2003
+ </xs:documentation>
2004
+ <xs:appinfo>
2005
+ <version>1.0</version>
2006
+ <source>The initial version of this enumeration was contributed by iSight Partners, Inc. and is used with their permission.</source>
2007
+ </xs:appinfo>
2008
+ </xs:annotation>
2009
+ <xs:restriction base="xs:string">
2010
+ <xs:enumeration value="Innovator">
2011
+ <xs:annotation>
2012
+ <xs:documentation>Demonstrates sophisticated capability. An innovator has the ability to create and script unique programs and codes targeting virtually any form of technology. At this level, this actor has a deep knowledge of networks, operating systems, programming languages, firmware, and infrastructure topologies and will demonstrate operational security when conducting his activities. Innovators are largely responsible for the discovery of 0-day vulnerabilities and the development of new attack techniques.</xs:documentation>
2013
+ </xs:annotation>
2014
+ </xs:enumeration>
2015
+ <xs:enumeration value="Expert">
2016
+ <xs:annotation>
2017
+ <xs:documentation>Demonstrates advanced capability. An actor possessing expert capability has the ability to modify existing programs or codes but does not have the capability to script sophisticated programs from scratch. The expert has a working knowledge of networks, operating systems, and possibly even defensive techniques and will typically exhibit some operational security.</xs:documentation>
2018
+ </xs:annotation>
2019
+ </xs:enumeration>
2020
+ <xs:enumeration value="Practitioner">
2021
+ <xs:annotation>
2022
+ <xs:documentation>Has a demonstrated, albeit low, capability. A practitioner possesses low sophistication capability. He does not have the ability to identify or exploit known vulnerabilities without the use of automated tools. He is proficient in the basic uses of publicly available hacking tools, but is unable to write or alter such programs on his own.</xs:documentation>
2023
+ </xs:annotation>
2024
+ </xs:enumeration>
2025
+ <xs:enumeration value="Novice">
2026
+ <xs:annotation>
2027
+ <xs:documentation>Demonstrates a nascent capability. A novice has basic computer skills and likely requires the assistance of a Practitioner or higher to engage in hacking activity. He uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet and lacks the ability to conduct his own reconnaissance and targeting research.</xs:documentation>
2028
+ </xs:annotation>
2029
+ </xs:enumeration>
2030
+ <xs:enumeration value="Aspirant">
2031
+ <xs:annotation>
2032
+ <xs:documentation>Demonstrates no capability.</xs:documentation>
2033
+ </xs:annotation>
2034
+ </xs:enumeration>
2035
+ </xs:restriction>
2036
+ </xs:simpleType>
2037
+ <xs:complexType name="InformationSourceRoleVocab-1.0">
2038
+ <xs:annotation>
2039
+ <xs:documentation>The InformationSourceRoleVocab is the default STIX vocabulary for characterizing roles played by given entities as information sources.</xs:documentation>
2040
+ </xs:annotation>
2041
+ <xs:simpleContent>
2042
+ <xs:restriction base="stixCommon:ControlledVocabularyStringType">
2043
+ <xs:simpleType>
2044
+ <xs:union memberTypes="stixVocabs:InformationSourceRoleEnum-1.0"/>
2045
+ </xs:simpleType>
2046
+ <xs:attribute name="vocab_name" type="xs:string" use="optional" fixed="STIX Default InformationSourceRole Vocabulary"/>
2047
+ <xs:attribute name="vocab_reference" type="xs:anyURI" use="optional" fixed="http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd#InformationSourceRoleVocab-1.0"/>
2048
+ </xs:restriction>
2049
+ </xs:simpleContent>
2050
+ </xs:complexType>
2051
+ <xs:simpleType name="InformationSourceRoleEnum-1.0">
2052
+ <xs:annotation>
2053
+ <xs:documentation>The default set of values to use for characterizing roles played by given entities as information sources in STIX.</xs:documentation>
2054
+ <xs:appinfo>
2055
+ <version>1.0</version>
2056
+ </xs:appinfo>
2057
+ </xs:annotation>
2058
+ <xs:restriction base="xs:string">
2059
+ <xs:enumeration value="Initial Author">
2060
+ <xs:annotation>
2061
+ <xs:documentation>A party acting as the initial author/creator of a set of information.</xs:documentation>
2062
+ </xs:annotation>
2063
+ </xs:enumeration>
2064
+ <xs:enumeration value="Content Enhancer/Refiner">
2065
+ <xs:annotation>
2066
+ <xs:documentation>A party that enhances or refines a preexisting set of information.</xs:documentation>
2067
+ </xs:annotation>
2068
+ </xs:enumeration>
2069
+ <xs:enumeration value="Aggregator">
2070
+ <xs:annotation>
2071
+ <xs:documentation>A party that aggregates multiple different sets of information into one new set of information.</xs:documentation>
2072
+ </xs:annotation>
2073
+ </xs:enumeration>
2074
+ <xs:enumeration value="Transformer/Translator">
2075
+ <xs:annotation>
2076
+ <xs:documentation>A party that transforms or translates a preexisting set of information into a different representation (e.g., translating an unstructured prose threat analysis report into STIX).</xs:documentation>
2077
+ </xs:annotation>
2078
+ </xs:enumeration>
2079
+ </xs:restriction>
2080
+ </xs:simpleType>
2081
+ </xs:schema>