http://download.nai.com/products/datfiles/4.x/nai/readme.txt
A97M/ Macro virus that infects Microsoft Access 97 files. APM/ Macro virus or Trojan horse program that infects Ami Pro document and template files. Bat/ Batch-file virus or Trojan horse program. These viruses usually run as batch or script files that affect a particular program that interprets the script or batch commands they include. They are very portable and can affect nearly any platform that can run batch or script files. The files themselves often have a .bat extension. CSC/ Corel Script virus or Trojan horse program that infects Corel Draw document files, template files, and scripts. IRC/ Internet Relay Chat script virus. This virus type can use early versions of the mIRC client software to distribute a virus or payload. JS/ Script virus or Trojan horse program written in JavaScript language. JV/ Potentially harmful Java application or applet. Linux/ Virus or Trojan horse program compiled for Linux operating system in ELF file format. LWP/ Potentially harmful software for Lotus WordPro. MacHC/ Virus or Trojan horse program for Apple Macintosh HyperCard scripting language. MacOS/ Virus or Trojan horse program for Apple Macintosh OS versions 6-9. MSIL/ Application written using Microsoft Intermediate Language framework, also known as .NET. P98M/ Macro virus or Trojan horse program that infects Microsoft Project documents and templates. PalmOS/ Virus or Trojan horse program for a Palm Pilot. PDF/ File-infector of Adobe PDF files. Perl/ Script virus or Trojan horse program written in Perl language. PHP/ Script virus or Trojan horse program written in PHP language. PP97M/ Macro virus. Infects Microsoft PowerPoint 97 files. RDN/ Denoting the malware signature was authored by McAfee Automation system. SunOS/ Potentially harmful software for Sun Solaris. SWF/ Potentially harmful software for Shockwave. Unix/ Program or a shell script for a version of UNIX. V5M/ Macro or script virus, or Trojan horse program that infects Visio VBA (Visual Basic for Applications) macros or scripts. VBS/ Script virus or Trojan horse program written in Visual Basic Script language. W16/ File-infector virus that runs in 16-bit Microsoft Windows environments (Windows 3.1x). W2K/ Potentially harmful software for 32-bit Microsoft Windows environments, specifically Windows NT, 2000, or XP. W32/ File-infector or boot-sector virus that runs in 32-bit Microsoft Windows environments (Windows 95, Windows 98, or Windows NT). W95/ File-infector virus that runs in Microsoft Windows 95, Windows 98, and Windows ME environments. W97M/ Macro virus that infects Microsoft Word 97 files. WHLP/ Potentially harmful software for 32-bit Microsoft Windows environments that target Windows HLP files. WM/ Macro virus that infects Microsoft Word 95 files. X97M/ Macro virus that infects Microsoft Excel 97 files. XF/ Macro virus that infects Microsoft Excel 95 or 97 via Excel formulas. XM/ Macro virus that infects Microsoft Excel 95 files.
AdClicker - Repeatedly accesses websites that are funded by advertising. Adware - Installs advertising software but does not ask permission. BackDoor - Provides remote access or control through the Internet or network. Dialer - Dials a phone number without asking for permission. DDoS - Operates as a Distributed Denial of Service component. Del - Deletes files. Downloader - Downloads software from the Internet, usually to deliver backdoors, password stealers, and sometimes viruses. Exploit - Uses a vulnerability or a software defect. FDoS - Denotes a Flooding Denial of Service component. KeyLog - Logs keystrokes for immediate or future transmission to the attacker. Kit - Denotes a program designed for creating a virus or Trojan horse program. MultiDropper - Drops several Trojan horse programs or viruses (often several different ‘backdoors’). Nuke - Uses defects in software installed on a remote computer to bring it down. ProcKill - Terminates the processes of anti-virus and security products. May also delete files associated with such applications. PWS - Steals a password. Reboot - Reboots the computer. Reg - Modifies the Registry in an undesirable fashion without asking questions. For example, reduces the security settings or creates abnormal associations or sets. Spam - Acts as a spamming tool. Spyware - Monitors browsing habits or other behavior and sends the information out, often for unsolicited advertising. Uploader - Sends files or other data from the computer. Vtool - Denotes a program used by virus writers or hackers for developing software. Zap - Wipes all or part of a hard disk.