org.mitre.maec.default_vocabularies_1.AntiRemovalTacticalObjectivesEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:30:29 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for AntiRemovalTacticalObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="AntiRemovalTacticalObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="prevent registry deletion"/>
* <enumeration value="prevent api unhooking"/>
* <enumeration value="prevent file access"/>
* <enumeration value="prevent memory access"/>
* <enumeration value="prevent registry access"/>
* <enumeration value="prevent file deletion"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "AntiRemovalTacticalObjectivesEnum-1.0")
@XmlEnum
public enum AntiRemovalTacticalObjectivesEnum10 {
/**
* The 'prevent registry deletion' value indicates that the malware instance is able to prevent its Windows registry entries from being deleted from a system.
*
*/
@XmlEnumValue("prevent registry deletion")
PREVENT_REGISTRY_DELETION("prevent registry deletion"),
/**
* The 'prevent api unhooking' value indicates that the malware instance is able to prevent its API hooks from being removed.
*
*/
@XmlEnumValue("prevent api unhooking")
PREVENT_API_UNHOOKING("prevent api unhooking"),
/**
* The 'prevent file access' value indicates that the malware instance is able to prevent access to the file system.
*
*/
@XmlEnumValue("prevent file access")
PREVENT_FILE_ACCESS("prevent file access"),
/**
* The 'prevent memory access' value indicates that the malware instance is able to prevent access to system memory where it may be storing code or data.
*
*/
@XmlEnumValue("prevent memory access")
PREVENT_MEMORY_ACCESS("prevent memory access"),
/**
* The 'prevent registry access' value indicates that the malware instance is able to prevent access to the Windows registry.
*
*/
@XmlEnumValue("prevent registry access")
PREVENT_REGISTRY_ACCESS("prevent registry access"),
/**
* The 'prevent file deletion' value indicates that the malware instance is able to prevent its files from being deleted from a system.
*
*/
@XmlEnumValue("prevent file deletion")
PREVENT_FILE_DELETION("prevent file deletion");
private final String value;
AntiRemovalTacticalObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static AntiRemovalTacticalObjectivesEnum10 fromValue(String v) {
for (AntiRemovalTacticalObjectivesEnum10 c : AntiRemovalTacticalObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}