org.mitre.maec.default_vocabularies_1.AntiCodeAnalysisTacticalObjectivesEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
The newest version!
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:19:53 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for AntiCodeAnalysisTacticalObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="AntiCodeAnalysisTacticalObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="transform control flow"/>
* <enumeration value="restructure arrays"/>
* <enumeration value="detect debugging"/>
* <enumeration value="prevent debugging"/>
* <enumeration value="defeat flow-oriented (recursive traversal) disassembler"/>
* <enumeration value="defeat linear disassembler"/>
* <enumeration value="obfuscate instructions"/>
* <enumeration value="obfuscate imports"/>
* <enumeration value="defeat call graph generation"/>
* <enumeration value="obfuscate runtime code"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "AntiCodeAnalysisTacticalObjectivesEnum-1.0")
@XmlEnum
public enum AntiCodeAnalysisTacticalObjectivesEnum10 {
/**
* The 'transform control flow' value indicates that the malware instance is able to transform its control flow.
*
*/
@XmlEnumValue("transform control flow")
TRANSFORM_CONTROL_FLOW("transform control flow"),
/**
* The 'restructure arrays' value indicates that the malware instance is able to restructure its arrays, making disassembly more difficult.
*
*/
@XmlEnumValue("restructure arrays")
RESTRUCTURE_ARRAYS("restructure arrays"),
/**
* The 'detect debugging' value indicates that the malware instance is able to detect its execution in a debugger.
*
*/
@XmlEnumValue("detect debugging")
DETECT_DEBUGGING("detect debugging"),
/**
* The 'prevent debugging' value indicates that the malware instance is able to prevent its execution in a debugger.
*
*/
@XmlEnumValue("prevent debugging")
PREVENT_DEBUGGING("prevent debugging"),
/**
* The 'defeat flow-oriented disassembler' value indicates that the malware instance is able to defeat its disassembly in a flow-oriented (recursive traversal) disassembler.
*
*/
@XmlEnumValue("defeat flow-oriented (recursive traversal) disassembler")
DEFEAT_FLOW_ORIENTED_RECURSIVE_TRAVERSAL_DISASSEMBLER(
"defeat flow-oriented (recursive traversal) disassembler"),
/**
* The 'defeat linear disassembler' value indicates that the malware instance is able to prevent its disassembly in a linear disassembler.
*
*/
@XmlEnumValue("defeat linear disassembler")
DEFEAT_LINEAR_DISASSEMBLER("defeat linear disassembler"),
/**
* The 'obfuscate instructions' value indicates that the malware instance obfuscates its instructions.
*
*/
@XmlEnumValue("obfuscate instructions")
OBFUSCATE_INSTRUCTIONS("obfuscate instructions"),
/**
* The 'obfuscate imports' value indicates that the malware instance is able to obfuscate its import table, making disassembly more difficult.
*
*/
@XmlEnumValue("obfuscate imports")
OBFUSCATE_IMPORTS("obfuscate imports"),
/**
* The 'defeat call graph generation' value indicates that the malware instance is able to defeat accurate call graph generation during disassembly.
*
*/
@XmlEnumValue("defeat call graph generation")
DEFEAT_CALL_GRAPH_GENERATION("defeat call graph generation"),
/**
* The 'obfuscate runtime code' value indicates that the malware instance is able to obfuscate its runtime code.
*
*/
@XmlEnumValue("obfuscate runtime code")
OBFUSCATE_RUNTIME_CODE("obfuscate runtime code");
private final String value;
AntiCodeAnalysisTacticalObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static AntiCodeAnalysisTacticalObjectivesEnum10 fromValue(String v) {
for (AntiCodeAnalysisTacticalObjectivesEnum10 c : AntiCodeAnalysisTacticalObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}