Skip to content

Secondary Operation

Ivan Kirillov edited this page Feb 20, 2014 · 9 revisions
Description The 'secondary operation' Capability indicates that the malware instance is able to achieve secondary objectives in conjunction with or after achieving its primary objectives.
Relationships
Properties
    References
    Examples

    Clone this wiki locally