org.mitre.maec.default_vocabularies_1.AntiDetectionStrategicObjectivesEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:30:29 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for AntiDetectionStrategicObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="AntiDetectionStrategicObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="security software evasion"/>
* <enumeration value="hide executing code"/>
* <enumeration value="self-modification"/>
* <enumeration value="anti-memory forensics"/>
* <enumeration value="hide non-executing code"/>
* <enumeration value="hide malware artifacts"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "AntiDetectionStrategicObjectivesEnum-1.0")
@XmlEnum
public enum AntiDetectionStrategicObjectivesEnum10 {
/**
* The 'security software evasion' value indicates that the malware instance is able to evade security software (e.g., anti-virus tools).
*
*/
@XmlEnumValue("security software evasion")
SECURITY_SOFTWARE_EVASION("security software evasion"),
/**
* The 'hide executing code' value indicates that the malware instance is able to hide its executing code.
*
*/
@XmlEnumValue("hide executing code")
HIDE_EXECUTING_CODE("hide executing code"),
/**
* The 'self-modification' value indicates that the malware instance is able to modify itself.
*
*/
@XmlEnumValue("self-modification")
SELF_MODIFICATION("self-modification"),
/**
* The 'anti-memory forensics' value indicates that the malware instance is able to prevent or make memory forensics more difficult.
*
*/
@XmlEnumValue("anti-memory forensics")
ANTI_MEMORY_FORENSICS("anti-memory forensics"),
/**
* The 'hide non-executing code' value indicates that the malware instance is able to hide its non-executing code.
*
*/
@XmlEnumValue("hide non-executing code")
HIDE_NON_EXECUTING_CODE("hide non-executing code"),
/**
* The 'hide malware artifacts' value indicates that the malware instance is able to hide its artifacts.
*
*/
@XmlEnumValue("hide malware artifacts")
HIDE_MALWARE_ARTIFACTS("hide malware artifacts");
private final String value;
AntiDetectionStrategicObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static AntiDetectionStrategicObjectivesEnum10 fromValue(String v) {
for (AntiDetectionStrategicObjectivesEnum10 c : AntiDetectionStrategicObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}