All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.mitre.maec.default_vocabularies_1.PersistenceTacticalObjectivesEnum10 Maven / Gradle / Ivy

The newest version!
/**
 * Copyright (c) 2015, The MITRE Corporation. All rights reserved.
 * See LICENSE for complete terms.
 */

//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2 
// See http://java.sun.com/xml/jaxb 
// Any modifications to this file will be lost upon recompilation of the source schema. 
// Generated on: 2015.07.01 at 03:19:53 PM EDT 
//

package org.mitre.maec.default_vocabularies_1;

import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;

/**
 * 

Java class for PersistenceTacticalObjectivesEnum-1.0. * *

The following schema fragment specifies the expected content contained within this class. *

*

 * <simpleType name="PersistenceTacticalObjectivesEnum-1.0">
 *   <restriction base="{http://www.w3.org/2001/XMLSchema}string">
 *     <enumeration value="reinstantiate self after initial detection"/>
 *     <enumeration value="limit application type/version"/>
 *     <enumeration value="persist after os install/reinstall"/>
 *     <enumeration value="drop/retrieve debug log file"/>
 *     <enumeration value="persist independent of hard disk/os changes"/>
 *     <enumeration value="persist after system reboot"/>
 *   </restriction>
 * </simpleType>
 * 
* */ @XmlType(name = "PersistenceTacticalObjectivesEnum-1.0") @XmlEnum public enum PersistenceTacticalObjectivesEnum10 { /** * The 'reinstantiate self after initial detection' value indicates that the malware instance is able to re-establish itself on the system after it is initially detected. * */ @XmlEnumValue("reinstantiate self after initial detection") REINSTANTIATE_SELF_AFTER_INITIAL_DETECTION( "reinstantiate self after initial detection"), /** * The 'limit application type/version' value indicates that the malware instance is able to limit the type or version of an application that runs on a system in order to ensure that it is able to continue executing. * */ @XmlEnumValue("limit application type/version") LIMIT_APPLICATION_TYPE_VERSION("limit application type/version"), /** * The 'persist after os install/reinstall' value indicates that the malware instance is able to continue to execute after the operating system is installed or reinstalled. * */ @XmlEnumValue("persist after os install/reinstall") PERSIST_AFTER_OS_INSTALL_REINSTALL("persist after os install/reinstall"), /** * The 'drop/retrieve debug log file' value indicates that the malware instance is able to generate and retrieve a log file of errors associated with the malware. * */ @XmlEnumValue("drop/retrieve debug log file") DROP_RETRIEVE_DEBUG_LOG_FILE("drop/retrieve debug log file"), /** * The 'persist independent of hard disk/os changes' value indicates that the malware instance is able to continue to execute after changes to the hard disk or the operating system have been made. * */ @XmlEnumValue("persist independent of hard disk/os changes") PERSIST_INDEPENDENT_OF_HARD_DISK_OS_CHANGES( "persist independent of hard disk/os changes"), /** * The 'persist after system reboot' value indicates that the malware instance is able to continue to execute after a system reboot. * */ @XmlEnumValue("persist after system reboot") PERSIST_AFTER_SYSTEM_REBOOT("persist after system reboot"); private final String value; PersistenceTacticalObjectivesEnum10(String v) { value = v; } public String value() { return value; } public static PersistenceTacticalObjectivesEnum10 fromValue(String v) { for (PersistenceTacticalObjectivesEnum10 c : PersistenceTacticalObjectivesEnum10 .values()) { if (c.value.equals(v)) { return c; } } throw new IllegalArgumentException(v); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy