org.mitre.maec.default_vocabularies_1.ProbingTacticalObjectivesEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.06.23 at 10:59:44 AM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for ProbingTacticalObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="ProbingTacticalObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="identify os"/>
* <enumeration value="check for proxy"/>
* <enumeration value="check for firewall"/>
* <enumeration value="check for network drives"/>
* <enumeration value="map local network"/>
* <enumeration value="inventory system applications"/>
* <enumeration value="check language"/>
* <enumeration value="check for internet connectivity"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "ProbingTacticalObjectivesEnum-1.0")
@XmlEnum
public enum ProbingTacticalObjectivesEnum10 {
/**
* The 'identify os' value indicates that the malware instance is able to identify the operating system under which it executes.
*
*/
@XmlEnumValue("identify os")
IDENTIFY_OS("identify os"),
/**
* The 'check for proxy' value indicates that the malware instance is able to check whether the network environment in which it executes contains a hardware or software proxy.
*
*/
@XmlEnumValue("check for proxy")
CHECK_FOR_PROXY("check for proxy"),
/**
* The 'check for firewall' value indicates that the malware instance is able to check whether the network environment in which it executes contains a hardware or software firewall.
*
*/
@XmlEnumValue("check for firewall")
CHECK_FOR_FIREWALL("check for firewall"),
/**
* The 'check for shared drive' value indicates that the malware instance is able to check for network drives that may be present in the network environment.
*
*/
@XmlEnumValue("check for network drives")
CHECK_FOR_NETWORK_DRIVES("check for network drives"),
/**
* The 'map local network' value indicates that the malware instance is able to map the layout of the local network environment in which it executes.
*
*/
@XmlEnumValue("map local network")
MAP_LOCAL_NETWORK("map local network"),
/**
* The 'inventory system applications' value indicates that the malware instance is able to inventory the applications installed on the system on which it executes.
*
*/
@XmlEnumValue("inventory system applications")
INVENTORY_SYSTEM_APPLICATIONS("inventory system applications"),
/**
* The 'check language' value indicates that the malware instance is able to check the language of the host system on which it executes.
*
*/
@XmlEnumValue("check language")
CHECK_LANGUAGE("check language"),
/**
* The 'check for internet connectivity' value indicates that the malware instance is able to check whether the network environment in which it executes is connected to the internet.
*
*/
@XmlEnumValue("check for internet connectivity")
CHECK_FOR_INTERNET_CONNECTIVITY("check for internet connectivity");
private final String value;
ProbingTacticalObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static ProbingTacticalObjectivesEnum10 fromValue(String v) {
for (ProbingTacticalObjectivesEnum10 c : ProbingTacticalObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}