All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.mitre.maec.default_vocabularies_1.MalwareCapabilityEnum10 Maven / Gradle / Ivy

The newest version!
/**
 * Copyright (c) 2015, The MITRE Corporation. All rights reserved.
 * See LICENSE for complete terms.
 */

//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2 
// See http://java.sun.com/xml/jaxb 
// Any modifications to this file will be lost upon recompilation of the source schema. 
// Generated on: 2015.07.01 at 03:19:53 PM EDT 
//

package org.mitre.maec.default_vocabularies_1;

import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;

/**
 * 

Java class for MalwareCapabilityEnum-1.0. * *

The following schema fragment specifies the expected content contained within this class. *

*

 * <simpleType name="MalwareCapabilityEnum-1.0">
 *   <restriction base="{http://www.w3.org/2001/XMLSchema}string">
 *     <enumeration value="command and control"/>
 *     <enumeration value="remote machine manipulation"/>
 *     <enumeration value="privilege escalation"/>
 *     <enumeration value="data theft"/>
 *     <enumeration value="spying"/>
 *     <enumeration value="secondary operation"/>
 *     <enumeration value="anti-detection"/>
 *     <enumeration value="anti-code analysis"/>
 *     <enumeration value="infection/propagation"/>
 *     <enumeration value="anti-behavioral analysis"/>
 *     <enumeration value="integrity violation"/>
 *     <enumeration value="data exfiltration"/>
 *     <enumeration value="probing"/>
 *     <enumeration value="anti-removal"/>
 *     <enumeration value="security degradation"/>
 *     <enumeration value="availability violation"/>
 *     <enumeration value="destruction"/>
 *     <enumeration value="fraud"/>
 *     <enumeration value="persistence"/>
 *     <enumeration value="machine access/control"/>
 *   </restriction>
 * </simpleType>
 * 
* */ @XmlType(name = "MalwareCapabilityEnum-1.0") @XmlEnum public enum MalwareCapabilityEnum10 { /** * The 'command and control' (C2) Capability indicates that the malware instance is able to receive and execute remotely submitted commands. * */ @XmlEnumValue("command and control") COMMAND_AND_CONTROL("command and control"), /** * The 'remote machine manipulation' Capability indicates that the malware instance is able to manipulate or access other remote machines. * */ @XmlEnumValue("remote machine manipulation") REMOTE_MACHINE_MANIPULATION("remote machine manipulation"), /** * The 'privilege escalation' Capability indicates that the malware instance is able to elevate the privileges under which it executes. * */ @XmlEnumValue("privilege escalation") PRIVILEGE_ESCALATION("privilege escalation"), /** * The 'data theft' Capability indicates that the malware instance is able to steal data from the system on which it executes. This includes data stored in some form, e.g. in a file, as well as data that may be entered into some application such as a web-browser. * */ @XmlEnumValue("data theft") DATA_THEFT("data theft"), /** * The 'spying' Capability indicates that the malware instance is able to capture information from a system related to user or system activity (e.g., from a system's peripheral devices). * */ @XmlEnumValue("spying") SPYING("spying"), /** * The 'secondary operation' Capability indicates that the malware instance is able to achieve secondary objectives in conjunction with or after achieving its primary objectives. * */ @XmlEnumValue("secondary operation") SECONDARY_OPERATION("secondary operation"), /** * The 'anti-detection' Capability indicates that the malware instance is able to prevent itself and its components from being detected on a system. * */ @XmlEnumValue("anti-detection") ANTI_DETECTION("anti-detection"), /** * The 'anti-code analysis' Capability indicates that the malware instance is able to prevent code analysis or make it more difficult. * */ @XmlEnumValue("anti-code analysis") ANTI_CODE_ANALYSIS("anti-code analysis"), /** * The 'infection/propagation' Capability indicates that the malware instance is able to propagate through the infection of a machine or is able to infect a file after executing on a system. The malware instance may infect actively (e.g., gain access to a machine directly) or passively (e.g., send malicious email). This Capability does not encompass any aspects of the initial infection that is done independently of the malware instance itself. * */ @XmlEnumValue("infection/propagation") INFECTION_PROPAGATION("infection/propagation"), /** * The 'anti-behavioral analysis' Capability indicates that the malware instance is able to prevent behavioral analysis or make it more difficult. * */ @XmlEnumValue("anti-behavioral analysis") ANTI_BEHAVIORAL_ANALYSIS("anti-behavioral analysis"), /** * The 'integrity violation' Capability indicates that the malware instance is able to compromise the integrity of a system. * */ @XmlEnumValue("integrity violation") INTEGRITY_VIOLATION("integrity violation"), /** * The 'data exfiltration' Capability indicates that the malware instance is able to exfiltrate stolen data or perform tasks related to the exfiltration of stolen data. * */ @XmlEnumValue("data exfiltration") DATA_EXFILTRATION("data exfiltration"), /** * The 'probing' Capability indicates that the malware instance is able to probe its host system or network environment; most often this is done to support other Capabilities and their Objectives. * */ @XmlEnumValue("probing") PROBING("probing"), /** * The 'anti-removal' Capability indicates that the malware instance is able to prevent itself and its components from being removed from a system. * */ @XmlEnumValue("anti-removal") ANTI_REMOVAL("anti-removal"), /** * The �security degradation� Capability indicates that the malware instance is able to bypass or disable security features and/or controls. * */ @XmlEnumValue("security degradation") SECURITY_DEGRADATION("security degradation"), /** * The 'availability violation' Capability indicates that the malware instance is able to compromise the availability of a system or some aspect of the system. * */ @XmlEnumValue("availability violation") AVAILABILITY_VIOLATION("availability violation"), /** * The 'destruction' Capability indicates that the malware instance is able to destroy some aspect of a system. * */ @XmlEnumValue("destruction") DESTRUCTION("destruction"), /** * The 'fraud' Capability indicates that the malware instance is able to defraud a user or a system. * */ @XmlEnumValue("fraud") FRAUD("fraud"), /** * The 'persistence' Capability indicates that the malware instance is able to persist and remain on a system regardless of system events. * */ @XmlEnumValue("persistence") PERSISTENCE("persistence"), /** * The 'machine access/control' Capability indicates that the malware instance is able to provide the means to access or control the machine on which it is resident. * */ @XmlEnumValue("machine access/control") MACHINE_ACCESS_CONTROL("machine access/control"); private final String value; MalwareCapabilityEnum10(String v) { value = v; } public String value() { return value; } public static MalwareCapabilityEnum10 fromValue(String v) { for (MalwareCapabilityEnum10 c : MalwareCapabilityEnum10.values()) { if (c.value.equals(v)) { return c; } } throw new IllegalArgumentException(v); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy