Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.
UNCLASSIFIED//LES
UNCLASSIFIED//LES Page2
1 TABLEOFCONTENTS
2 Introduction ..........................................................................................................................................4
2.1 Purpose .........................................................................................................................................4
2.2 IntendedAudience........................................................................................................................ 4
2.3 Terminology .................................................................................................................................. 4
2.4 ProductFeatures........................................................................................................................... 4
3 Assumptions..........................................................................................................................................6
4 UserStories...........................................................................................................................................7
4.1 User ...............................................................................................................................................7
4.1.2 Targeting ............................................................................................................................... 7
4.1.3 TrafficInjectionCriteria ........................................................................................................8
4.1.4 TrafficInjection .....................................................................................................................8
4.1.5 ApplicationExecution ...........................................................................................................8
4.1.6 ApplicationTermination .......................................................................................................9
4.1.7 DetectionAvoidance...........................................................................................................10
4.1.8 ReverseEngineering............................................................................................................11
4.1.9 Preparation ......................................................................................................................... 11
4.1.10 Delivery ............................................................................................................................... 11
4.2 Developer....................................................................................................................................11
4.3 Tester ..........................................................................................................................................12
5 Requirements......................................................................................................................................13
5.1 OperatingEnvironment ..............................................................................................................13
5.1.1 SupportedOperatingSystems ............................................................................................13
5.1.2 Networks.............................................................................................................................13
5.1.3 Internationalization............................................................................................................. 14
5.2 DesignandImplementationConstraints ....................................................................................14
5.2.1 ResourceUsage...................................................................................................................14
5.2.2 Hardware............................................................................................................................. 14
5.2.3 ExternallySuppliedRuntimeLibraryDependencies ...........................................................14
5.2.4 Third‐partySoftwareCompatibility ....................................................................................15
6 Non‐FunctionalRequirements............................................................................................................16