org.mitre.maec.default_vocabularies_1.PersistenceTacticalObjectivesEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:30:29 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for PersistenceTacticalObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="PersistenceTacticalObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="reinstantiate self after initial detection"/>
* <enumeration value="limit application type/version"/>
* <enumeration value="persist after os install/reinstall"/>
* <enumeration value="drop/retrieve debug log file"/>
* <enumeration value="persist independent of hard disk/os changes"/>
* <enumeration value="persist after system reboot"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "PersistenceTacticalObjectivesEnum-1.0")
@XmlEnum
public enum PersistenceTacticalObjectivesEnum10 {
/**
* The 'reinstantiate self after initial detection' value indicates that the malware instance is able to re-establish itself on the system after it is initially detected.
*
*/
@XmlEnumValue("reinstantiate self after initial detection")
REINSTANTIATE_SELF_AFTER_INITIAL_DETECTION(
"reinstantiate self after initial detection"),
/**
* The 'limit application type/version' value indicates that the malware instance is able to limit the type or version of an application that runs on a system in order to ensure that it is able to continue executing.
*
*/
@XmlEnumValue("limit application type/version")
LIMIT_APPLICATION_TYPE_VERSION("limit application type/version"),
/**
* The 'persist after os install/reinstall' value indicates that the malware instance is able to continue to execute after the operating system is installed or reinstalled.
*
*/
@XmlEnumValue("persist after os install/reinstall")
PERSIST_AFTER_OS_INSTALL_REINSTALL("persist after os install/reinstall"),
/**
* The 'drop/retrieve debug log file' value indicates that the malware instance is able to generate and retrieve a log file of errors associated with the malware.
*
*/
@XmlEnumValue("drop/retrieve debug log file")
DROP_RETRIEVE_DEBUG_LOG_FILE("drop/retrieve debug log file"),
/**
* The 'persist independent of hard disk/os changes' value indicates that the malware instance is able to continue to execute after changes to the hard disk or the operating system have been made.
*
*/
@XmlEnumValue("persist independent of hard disk/os changes")
PERSIST_INDEPENDENT_OF_HARD_DISK_OS_CHANGES(
"persist independent of hard disk/os changes"),
/**
* The 'persist after system reboot' value indicates that the malware instance is able to continue to execute after a system reboot.
*
*/
@XmlEnumValue("persist after system reboot")
PERSIST_AFTER_SYSTEM_REBOOT("persist after system reboot");
private final String value;
PersistenceTacticalObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static PersistenceTacticalObjectivesEnum10 fromValue(String v) {
for (PersistenceTacticalObjectivesEnum10 c : PersistenceTacticalObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}