Skip to content

Class: DataSource

DEPRECATED as of ATT&CK Specification 3.3.0. Superseded by the Detection Strategy and Analytic framework. Will be removed in ATT&CK Specification 4.0.0.

Data Sources represented categories of information that could be collected from a computing environment to identify signs of adversary technique execution. They were organized hierarchically: each Data Source contained one or more Data Components specifying observable events within that source category.

The data source hierarchy was:

_ DataSource (x-mitre-data-source) →_

_ DataComponent (x-mitre-data-component) →_

_ detects →_

_ Technique (attack-pattern)_

__

Retained for backward compatibility with ATT&CK datasets prior to Spec 3.3.0.

URI: attack:DataSource

 classDiagram
    class DataSource
    click DataSource href "../DataSource/"
      AttackObject <|-- DataSource
        click AttackObject href "../AttackObject/"

      DataSource : confidence

      DataSource : created

      DataSource : created_by_ref

      DataSource : description

      DataSource : extensions

      DataSource : external_references





        DataSource --> "1..*" ExternalReference : external_references
        click ExternalReference href "../ExternalReference/"



      DataSource : granular_markings





        DataSource --> "*" GranularMarking : granular_markings
        click GranularMarking href "../GranularMarking/"



      DataSource : id

      DataSource : labels

      DataSource : lang

      DataSource : modified

      DataSource : name

      DataSource : object_marking_refs

      DataSource : revoked

      DataSource : spec_version





        DataSource --> "1" SpecVersionEnum : spec_version
        click SpecVersionEnum href "../SpecVersionEnum/"



      DataSource : type

      DataSource : x_mitre_attack_spec_version

      DataSource : x_mitre_collection_layers





        DataSource --> "1..*" AttackCollectionLayerEnum : x_mitre_collection_layers
        click AttackCollectionLayerEnum href "../AttackCollectionLayerEnum/"



      DataSource : x_mitre_contributors

      DataSource : x_mitre_deprecated

      DataSource : x_mitre_domains





        DataSource --> "1..*" AttackDomainEnum : x_mitre_domains
        click AttackDomainEnum href "../AttackDomainEnum/"



      DataSource : x_mitre_modified_by_ref

      DataSource : x_mitre_old_attack_id

      DataSource : x_mitre_platforms





        DataSource --> "*" AttackPlatformEnum : x_mitre_platforms
        click AttackPlatformEnum href "../AttackPlatformEnum/"



      DataSource : x_mitre_version

Inheritance

Slots

Name Cardinality and Range Description Inheritance
x_mitre_domains 1..*
AttackDomainEnum
The ATT&CK technology domains to which this object belongs direct
x_mitre_platforms *
AttackPlatformEnum
The set of technology platforms or operating environments to which this ATT&C... direct
x_mitre_contributors *
String
Names of people and organizations who have contributed to the creation or enr... direct
x_mitre_modified_by_ref 1
StixIdentifier
The STIX ID of the identity object that created the current version of this o... direct
x_mitre_collection_layers 1..*
AttackCollectionLayerEnum
The technology stack layers from which telemetry for this Data Source can be ... direct
x_mitre_attack_spec_version 1
SemverString
The version of the ATT&CK Data Model specification used to construct this obj... AttackObject
x_mitre_version 1
AttackVersionString
The version of this ATT&CK object content in 'major AttackObject
x_mitre_deprecated 0..1
Boolean
Boolean flag indicating that this ATT&CK object has been deprecated and shoul... AttackObject
x_mitre_old_attack_id 0..1
String
A legacy ATT&CK ID previously assigned to this object before a knowledge base... AttackObject
type 1
StixTypeName
STIX object type Core, StixEntity
spec_version 1
SpecVersionEnum
STIX specification version Core
id 1
StixIdentifier
STIX object identifier Core, StixEntity
created 1
Datetime
Creation timestamp Core
modified 1
Datetime
Modification timestamp Core
created_by_ref 1
StixIdentifier
The STIX ID of the identity object that first created this ATT&CK object Core
labels *
String
Terms used to describe this object Core
revoked 0..1
Boolean
Indicates whether this object has been revoked Core
confidence 0..1
Integer
Confidence that the producer has in this data Core
lang 0..1
String
Language of textual properties Core
external_references 1..*
ExternalReference
External references Core
object_marking_refs 1..*
StixIdentifier
Marking definition references applied to this object Core
granular_markings *
GranularMarking
Granular markings that apply to selected content Core
extensions *
String
Open-ended extension payloads Core
name 1
String
The name of the data source category (e StixEntity
description 1
String
A description of this data source, the type of information it provides, and h... StixEntity

In Subsets

Identifier and Mapping Information

Annotations

property value
stix_type x-mitre-data-source
attack_id_format DS####

Schema Source

  • from schema: https://w3id.org/lmodel/attack

Mappings

Mapping Type Mapped Value
self attack:DataSource
native attack:DataSource

LinkML Source

Direct

name: DataSource
annotations:
  stix_type:
    tag: stix_type
    value: x-mitre-data-source
  attack_id_format:
    tag: attack_id_format
    value: DS####
description: "DEPRECATED as of ATT&CK Specification 3.3.0. Superseded by the Detection\
  \ Strategy and Analytic framework. Will be removed in ATT&CK Specification 4.0.0.\n\
  Data Sources represented categories of information that could be collected from\
  \ a computing environment to identify signs of adversary technique execution. They\
  \ were organized hierarchically: each Data Source contained one or more Data Components\
  \ specifying observable events within that source category.\nThe data source hierarchy\
  \ was:\n  DataSource (x-mitre-data-source) →\n    DataComponent (x-mitre-data-component)\
  \ →\n      detects →\n        Technique (attack-pattern)\n\nRetained for backward\
  \ compatibility with ATT&CK datasets prior to Spec 3.3.0."
in_subset:
- attack_sdos
- deprecated
from_schema: https://w3id.org/lmodel/attack
is_a: AttackObject
slots:
- x_mitre_domains
- x_mitre_platforms
- x_mitre_contributors
- x_mitre_modified_by_ref
- x_mitre_collection_layers
slot_usage:
  type:
    name: type
    required: true
    pattern: ^x-mitre-data-source$
  id:
    name: id
    required: true
    pattern: ^x-mitre-data-source--
  name:
    name: name
    description: The name of the data source category (e.g., 'Process', 'Network Traffic',
      'File', 'Windows Registry').
    required: true
  description:
    name: description
    description: A description of this data source, the type of information it provides,
      and how it can be used to detect adversary activity.
    required: true
  external_references:
    name: external_references
    description: External references. The first entry MUST have source_name 'mitre-attack'
      and contain the data source's ATT&CK ID as external_id (e.g., 'DS0009').
    comments:
    - 'jsonschema_minItems: "1"'
    required: true
  created_by_ref:
    name: created_by_ref
    required: true
  object_marking_refs:
    name: object_marking_refs
    required: true
  x_mitre_domains:
    name: x_mitre_domains
    required: true
  x_mitre_modified_by_ref:
    name: x_mitre_modified_by_ref
    required: true
  x_mitre_collection_layers:
    name: x_mitre_collection_layers
    required: true

Induced

name: DataSource
annotations:
  stix_type:
    tag: stix_type
    value: x-mitre-data-source
  attack_id_format:
    tag: attack_id_format
    value: DS####
description: "DEPRECATED as of ATT&CK Specification 3.3.0. Superseded by the Detection\
  \ Strategy and Analytic framework. Will be removed in ATT&CK Specification 4.0.0.\n\
  Data Sources represented categories of information that could be collected from\
  \ a computing environment to identify signs of adversary technique execution. They\
  \ were organized hierarchically: each Data Source contained one or more Data Components\
  \ specifying observable events within that source category.\nThe data source hierarchy\
  \ was:\n  DataSource (x-mitre-data-source) →\n    DataComponent (x-mitre-data-component)\
  \ →\n      detects →\n        Technique (attack-pattern)\n\nRetained for backward\
  \ compatibility with ATT&CK datasets prior to Spec 3.3.0."
in_subset:
- attack_sdos
- deprecated
from_schema: https://w3id.org/lmodel/attack
is_a: AttackObject
slot_usage:
  type:
    name: type
    required: true
    pattern: ^x-mitre-data-source$
  id:
    name: id
    required: true
    pattern: ^x-mitre-data-source--
  name:
    name: name
    description: The name of the data source category (e.g., 'Process', 'Network Traffic',
      'File', 'Windows Registry').
    required: true
  description:
    name: description
    description: A description of this data source, the type of information it provides,
      and how it can be used to detect adversary activity.
    required: true
  external_references:
    name: external_references
    description: External references. The first entry MUST have source_name 'mitre-attack'
      and contain the data source's ATT&CK ID as external_id (e.g., 'DS0009').
    comments:
    - 'jsonschema_minItems: "1"'
    required: true
  created_by_ref:
    name: created_by_ref
    required: true
  object_marking_refs:
    name: object_marking_refs
    required: true
  x_mitre_domains:
    name: x_mitre_domains
    required: true
  x_mitre_modified_by_ref:
    name: x_mitre_modified_by_ref
    required: true
  x_mitre_collection_layers:
    name: x_mitre_collection_layers
    required: true
attributes:
  x_mitre_domains:
    name: x_mitre_domains
    description: The ATT&CK technology domains to which this object belongs. At least
      one domain must be specified. An object may belong to multiple domains when
      the same technique, group, or software is relevant across domain boundaries.
    comments:
    - 'jsonschema_minItems: "1"'
    in_subset:
    - attack_sdos
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_domains
    owner: DataSource
    domain_of:
    - Technique
    - Tactic
    - Group
    - AttackCampaign
    - Mitigation
    - AttackMalware
    - AttackTool
    - Asset
    - DataSource
    - DataComponent
    - Matrix
    - DetectionStrategy
    - Analytic
    range: AttackDomainEnum
    required: true
    multivalued: true
  x_mitre_platforms:
    name: x_mitre_platforms
    description: The set of technology platforms or operating environments to which
      this ATT&CK object applies. Each value must be a supported ATT&CK platform identifier.
      Values within the array must be unique; duplicate platforms are not permitted.
    comments:
    - 'jsonschema_minItems: "1" validator_hint: no-duplicate-platforms'
    in_subset:
    - attack_sdos
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_platforms
    owner: DataSource
    domain_of:
    - Technique
    - AttackMalware
    - AttackTool
    - Asset
    - DataSource
    - Analytic
    range: AttackPlatformEnum
    multivalued: true
  x_mitre_contributors:
    name: x_mitre_contributors
    description: Names of people and organizations who have contributed to the creation
      or enrichment of this ATT&CK object. Contributors are credited for providing
      information, examples, or analysis that informed the object's content. Not present
      on relationship objects.
    in_subset:
    - attack_sdos
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_contributors
    owner: DataSource
    domain_of:
    - Technique
    - Tactic
    - Group
    - AttackCampaign
    - Mitigation
    - AttackMalware
    - AttackTool
    - Asset
    - DataSource
    - DetectionStrategy
    range: string
    multivalued: true
  x_mitre_modified_by_ref:
    name: x_mitre_modified_by_ref
    description: 'The STIX ID of the identity object that created the current version
      of this object. In practice, always references MITRE''s canonical identity object:
      identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5. May differ from created_by_ref
      if the object was originally created by a third party and subsequently adopted
      or updated by MITRE.'
    comments:
    - 'validator_hint: must-match-mitre-identity-id'
    in_subset:
    - attack_sdos
    - attack_sros
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_modified_by_ref
    owner: DataSource
    domain_of:
    - Technique
    - Tactic
    - Group
    - AttackCampaign
    - Mitigation
    - AttackMalware
    - AttackTool
    - Asset
    - DataSource
    - DataComponent
    - Matrix
    - Collection
    - DetectionStrategy
    - Analytic
    - AttackRelationship
    range: stix_identifier
    required: true
    pattern: ^identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5$
  x_mitre_collection_layers:
    name: x_mitre_collection_layers
    description: The technology stack layers from which telemetry for this Data Source
      can be collected. Indicates where in the environment defenders should look to
      obtain the raw data this source provides. At least one collection layer must
      be specified.
    comments:
    - 'jsonschema_minItems: "1"'
    in_subset:
    - attack_sdos
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_collection_layers
    owner: DataSource
    domain_of:
    - DataSource
    range: AttackCollectionLayerEnum
    required: true
    multivalued: true
  x_mitre_attack_spec_version:
    name: x_mitre_attack_spec_version
    description: The version of the ATT&CK Data Model specification used to construct
      this object, in MAJOR.MINOR.PATCH (semantic versioning) format. Helps consuming
      software determine whether the data format is supported. Objects lacking this
      property are assumed to conform to ATT&CK spec version 2.0.0. Refer to the ATT&CK
      CHANGELOG for all supported versions.
    comments:
    - 'absent_on: marking-definition, identity (x_mitre_version absent), relationship
      (x_mitre_version absent)'
    in_subset:
    - attack_sdos
    - attack_sros
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_attack_spec_version
    owner: DataSource
    domain_of:
    - AttackObject
    range: semver_string
    required: true
  x_mitre_version:
    name: x_mitre_version
    description: 'The version of this ATT&CK object content in ''major.minor'' format,
      where both components are integers between 0 and 99. Incremented by ATT&CK whenever
      the substantive content of the object changes. Does not apply to relationship
      objects. Example: "1.0", "12.5".'
    comments:
    - 'absent_on: relationship, marking-definition'
    in_subset:
    - attack_sdos
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_version
    owner: DataSource
    domain_of:
    - AttackObject
    range: attack_version_string
    required: true
  x_mitre_deprecated:
    name: x_mitre_deprecated
    description: Boolean flag indicating that this ATT&CK object has been deprecated
      and should no longer be used in new analyses or tooling implementations. Deprecated
      objects are retained in the knowledge base for historical reference and legacy
      compatibility, but are not actively maintained with new information.
    comments:
    - 'absent_on: marking-definition'
    in_subset:
    - attack_sdos
    - attack_sros
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_deprecated
    owner: DataSource
    domain_of:
    - AttackObject
    range: boolean
  x_mitre_old_attack_id:
    name: x_mitre_old_attack_id
    description: A legacy ATT&CK ID previously assigned to this object before a knowledge
      base restructuring or domain migration event. Format mirrors the current ATT&CK
      ID format but from the prior numbering scheme (e.g., "MOB-T1001" for a mobile
      technique previously in the pre-unification Mobile ATT&CK dataset).
    in_subset:
    - attack_sdos
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: x_mitre_old_attack_id
    owner: DataSource
    domain_of:
    - AttackObject
    range: string
  type:
    name: type
    description: STIX object type.
    from_schema: https://w3id.org/lmodel/attack
    related_mappings:
    - unified_cyber_ontology:state
    rank: 1000
    alias: type
    owner: DataSource
    domain_of:
    - StixEntity
    - Bundle
    - Core
    - CyberObservableCore
    - ExtensionDefinition
    - LanguageContent
    - MarkingDefinition
    - File
    range: stix_type_name
    required: true
    pattern: ^x-mitre-data-source$
  spec_version:
    name: spec_version
    description: STIX specification version.
    from_schema: https://w3id.org/lmodel/attack
    close_mappings:
    - unified_cyber_ontology:specVersion
    rank: 1000
    alias: spec_version
    owner: DataSource
    domain_of:
    - Core
    - CyberObservableCore
    - MarkingDefinition
    range: SpecVersionEnum
    required: true
  id:
    name: id
    description: STIX object identifier.
    from_schema: https://w3id.org/lmodel/attack
    related_mappings:
    - unified_cyber_ontology:externalReference
    rank: 1000
    alias: id
    owner: DataSource
    domain_of:
    - StixEntity
    - Bundle
    - Core
    - CyberObservableCore
    - ExtensionDefinition
    - LanguageContent
    - MarkingDefinition
    - File
    range: stix_identifier
    required: true
    pattern: ^x-mitre-data-source--
  created:
    name: created
    description: Creation timestamp.
    notes:
    - STIX core timestamps require millisecond precision.
    from_schema: https://w3id.org/lmodel/attack
    close_mappings:
    - unified_cyber_ontology:objectCreatedTime
    rank: 1000
    alias: created
    owner: DataSource
    domain_of:
    - Core
    - MarkingDefinition
    range: datetime
    required: true
    pattern: T\d{2}:\d{2}:\d{2}\.\d{3,}Z$
  modified:
    name: modified
    description: Modification timestamp.
    notes:
    - STIX core timestamps require millisecond precision.
    from_schema: https://w3id.org/lmodel/attack
    close_mappings:
    - unified_cyber_ontology:modifiedTime
    rank: 1000
    alias: modified
    owner: DataSource
    domain_of:
    - Core
    range: datetime
    required: true
    pattern: T\d{2}:\d{2}:\d{2}\.\d{3,}Z$
  created_by_ref:
    name: created_by_ref
    description: The STIX ID of the identity object that first created this ATT&CK
      object. Typically references MITRE's identity (identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5).
    from_schema: https://w3id.org/lmodel/attack
    close_mappings:
    - unified_cyber_ontology:createdBy
    rank: 1000
    alias: created_by_ref
    owner: DataSource
    domain_of:
    - Core
    - MarkingDefinition
    range: stix_identifier
    required: true
  labels:
    name: labels
    description: Terms used to describe this object.
    comments:
    - 'jsonschema_minItems: "1"'
    from_schema: https://w3id.org/lmodel/attack
    close_mappings:
    - unified_cyber_ontology:tag
    rank: 1000
    alias: labels
    owner: DataSource
    domain_of:
    - Core
    range: string
    multivalued: true
  revoked:
    name: revoked
    description: Indicates whether this object has been revoked.
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: revoked
    owner: DataSource
    domain_of:
    - Core
    range: boolean
  confidence:
    name: confidence
    description: Confidence that the producer has in this data.
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: confidence
    owner: DataSource
    domain_of:
    - Core
    range: integer
    minimum_value: 0
    maximum_value: 100
  lang:
    name: lang
    description: Language of textual properties.
    from_schema: https://w3id.org/lmodel/attack
    rank: 1000
    alias: lang
    owner: DataSource
    domain_of:
    - Core
    - GranularMarking
    range: string
  external_references:
    name: external_references
    description: External references. The first entry MUST have source_name 'mitre-attack'
      and contain the data source's ATT&CK ID as external_id (e.g., 'DS0009').
    comments:
    - 'jsonschema_minItems: "1"'
    from_schema: https://w3id.org/lmodel/attack
    close_mappings:
    - unified_cyber_ontology:externalReference
    rank: 1000
    alias: external_references
    owner: DataSource
    domain_of:
    - Core
    - MarkingDefinition
    range: ExternalReference
    required: true
    multivalued: true
  object_marking_refs:
    name: object_marking_refs
    description: Marking definition references applied to this object.
    comments:
    - 'jsonschema_minItems: "1"'
    from_schema: https://w3id.org/lmodel/attack
    close_mappings:
    - unified_cyber_ontology:objectMarking
    rank: 1000
    alias: object_marking_refs
    owner: DataSource
    domain_of:
    - Core
    - CyberObservableCore
    - MarkingDefinition
    range: stix_identifier
    required: true
    multivalued: true
  granular_markings:
    name: granular_markings
    description: Granular markings that apply to selected content.
    comments:
    - 'jsonschema_minItems: "1"'
    from_schema: https://w3id.org/lmodel/attack
    narrow_mappings:
    - unified_cyber_ontology:objectMarking
    rank: 1000
    alias: granular_markings
    owner: DataSource
    domain_of:
    - Core
    - CyberObservableCore
    - MarkingDefinition
    range: GranularMarking
    multivalued: true
  extensions:
    name: extensions
    description: Open-ended extension payloads.
    notes:
    - JSON Schema uses patternProperties for extension keys; exact key validation
      is delegated to validator tooling.
    comments:
    - 'jsonschema_rule: patternProperties validator_hint: validate-extension-keys-and-values'
    from_schema: https://w3id.org/lmodel/attack
    related_mappings:
    - unified_cyber_ontology:hasFacet
    rank: 1000
    alias: extensions
    owner: DataSource
    domain_of:
    - Core
    - CyberObservableCore
    - MarkingDefinition
    - File
    range: string
    multivalued: true
  name:
    name: name
    description: The name of the data source category (e.g., 'Process', 'Network Traffic',
      'File', 'Windows Registry').
    from_schema: https://w3id.org/lmodel/attack
    exact_mappings:
    - unified_cyber_ontology:name
    rank: 1000
    alias: name
    owner: DataSource
    domain_of:
    - RelatedAsset
    - StixEntity
    - ExtensionDefinition
    - MarkingDefinition
    - AutonomousSystem
    - File
    range: string
    required: true
  description:
    name: description
    description: A description of this data source, the type of information it provides,
      and how it can be used to detect adversary activity.
    from_schema: https://w3id.org/lmodel/attack
    close_mappings:
    - unified_cyber_ontology:description
    rank: 1000
    alias: description
    owner: DataSource
    domain_of:
    - RelatedAsset
    - MutableElement
    - StixEntity
    - ExtensionDefinition
    - ExternalReference
    range: string
    required: true