org.mitre.maec.default_vocabularies_1.MalwareCapabilityEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:30:29 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for MalwareCapabilityEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="MalwareCapabilityEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="command and control"/>
* <enumeration value="remote machine manipulation"/>
* <enumeration value="privilege escalation"/>
* <enumeration value="data theft"/>
* <enumeration value="spying"/>
* <enumeration value="secondary operation"/>
* <enumeration value="anti-detection"/>
* <enumeration value="anti-code analysis"/>
* <enumeration value="infection/propagation"/>
* <enumeration value="anti-behavioral analysis"/>
* <enumeration value="integrity violation"/>
* <enumeration value="data exfiltration"/>
* <enumeration value="probing"/>
* <enumeration value="anti-removal"/>
* <enumeration value="security degradation"/>
* <enumeration value="availability violation"/>
* <enumeration value="destruction"/>
* <enumeration value="fraud"/>
* <enumeration value="persistence"/>
* <enumeration value="machine access/control"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "MalwareCapabilityEnum-1.0")
@XmlEnum
public enum MalwareCapabilityEnum10 {
/**
* The 'command and control' (C2) Capability indicates that the malware instance is able to receive and execute remotely submitted commands.
*
*/
@XmlEnumValue("command and control")
COMMAND_AND_CONTROL("command and control"),
/**
* The 'remote machine manipulation' Capability indicates that the malware instance is able to manipulate or access other remote machines.
*
*/
@XmlEnumValue("remote machine manipulation")
REMOTE_MACHINE_MANIPULATION("remote machine manipulation"),
/**
* The 'privilege escalation' Capability indicates that the malware instance is able to elevate the privileges under which it executes.
*
*/
@XmlEnumValue("privilege escalation")
PRIVILEGE_ESCALATION("privilege escalation"),
/**
* The 'data theft' Capability indicates that the malware instance is able to steal data from the system on which it executes. This includes data stored in some form, e.g. in a file, as well as data that may be entered into some application such as a web-browser.
*
*/
@XmlEnumValue("data theft")
DATA_THEFT("data theft"),
/**
* The 'spying' Capability indicates that the malware instance is able to capture information from a system related to user or system activity (e.g., from a system's peripheral devices).
*
*/
@XmlEnumValue("spying")
SPYING("spying"),
/**
* The 'secondary operation' Capability indicates that the malware instance is able to achieve secondary objectives in conjunction with or after achieving its primary objectives.
*
*/
@XmlEnumValue("secondary operation")
SECONDARY_OPERATION("secondary operation"),
/**
* The 'anti-detection' Capability indicates that the malware instance is able to prevent itself and its components from being detected on a system.
*
*/
@XmlEnumValue("anti-detection")
ANTI_DETECTION("anti-detection"),
/**
* The 'anti-code analysis' Capability indicates that the malware instance is able to prevent code analysis or make it more difficult.
*
*/
@XmlEnumValue("anti-code analysis")
ANTI_CODE_ANALYSIS("anti-code analysis"),
/**
* The 'infection/propagation' Capability indicates that the malware instance is able to propagate through the infection of a machine or is able to infect a file after executing on a system. The malware instance may infect actively (e.g., gain access to a machine directly) or passively (e.g., send malicious email). This Capability does not encompass any aspects of the initial infection that is done independently of the malware instance itself.
*
*/
@XmlEnumValue("infection/propagation")
INFECTION_PROPAGATION("infection/propagation"),
/**
* The 'anti-behavioral analysis' Capability indicates that the malware instance is able to prevent behavioral analysis or make it more difficult.
*
*/
@XmlEnumValue("anti-behavioral analysis")
ANTI_BEHAVIORAL_ANALYSIS("anti-behavioral analysis"),
/**
* The 'integrity violation' Capability indicates that the malware instance is able to compromise the integrity of a system.
*
*/
@XmlEnumValue("integrity violation")
INTEGRITY_VIOLATION("integrity violation"),
/**
* The 'data exfiltration' Capability indicates that the malware instance is able to exfiltrate stolen data or perform tasks related to the exfiltration of stolen data.
*
*/
@XmlEnumValue("data exfiltration")
DATA_EXFILTRATION("data exfiltration"),
/**
* The 'probing' Capability indicates that the malware instance is able to probe its host system or network environment; most often this is done to support other Capabilities and their Objectives.
*
*/
@XmlEnumValue("probing")
PROBING("probing"),
/**
* The 'anti-removal' Capability indicates that the malware instance is able to prevent itself and its components from being removed from a system.
*
*/
@XmlEnumValue("anti-removal")
ANTI_REMOVAL("anti-removal"),
/**
* The �security degradation� Capability indicates that the malware instance is able to bypass or disable security features and/or controls.
*
*/
@XmlEnumValue("security degradation")
SECURITY_DEGRADATION("security degradation"),
/**
* The 'availability violation' Capability indicates that the malware instance is able to compromise the availability of a system or some aspect of the system.
*
*/
@XmlEnumValue("availability violation")
AVAILABILITY_VIOLATION("availability violation"),
/**
* The 'destruction' Capability indicates that the malware instance is able to destroy some aspect of a system.
*
*/
@XmlEnumValue("destruction")
DESTRUCTION("destruction"),
/**
* The 'fraud' Capability indicates that the malware instance is able to defraud a user or a system.
*
*/
@XmlEnumValue("fraud")
FRAUD("fraud"),
/**
* The 'persistence' Capability indicates that the malware instance is able to persist and remain on a system regardless of system events.
*
*/
@XmlEnumValue("persistence")
PERSISTENCE("persistence"),
/**
* The 'machine access/control' Capability indicates that the malware instance is able to provide the means to access or control the machine on which it is resident.
*
*/
@XmlEnumValue("machine access/control")
MACHINE_ACCESS_CONTROL("machine access/control");
private final String value;
MalwareCapabilityEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static MalwareCapabilityEnum10 fromValue(String v) {
for (MalwareCapabilityEnum10 c : MalwareCapabilityEnum10.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}