Skip to content

Slot: x_mitre_modified_by_ref

The STIX ID of the identity object that created the current version of this object. In practice, always references MITRE's canonical identity object: identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5. May differ from created_by_ref if the object was originally created by a third party and subsequently adopted or updated by MITRE.

URI: attack:x_mitre_modified_by_ref Alias: x_mitre_modified_by_ref

Applicable Classes

Name Description Modifies Slot
AttackMalware Malware represents malicious software programs that adversaries use to accomp... yes
AttackTool Tools represent legitimate software programs that adversaries may abuse or re... yes
Technique Techniques describe the specific methods adversaries use to achieve tactical ... no
Asset Assets represent physical or logical systems, devices, and technologies withi... no
Tactic Tactics represent the adversary's high-level strategic objectives during an a... yes
DataSource DEPRECATED as of ATT&CK Specification 3 yes
Analytic Analytics contain the concrete, platform-specific detection logic implementin... no
Mitigation Mitigations describe defensive measures, security controls, and configuration... yes
AttackRelationship ATT&CK Relationship objects connect ATT&CK STIX objects using typed semantic ... yes
Collection Collections are versioned snapshots of an ATT&CK dataset grouping all STIX ob... no
DetectionStrategy Detection Strategies define high-level, platform-agnostic approaches for dete... yes
AttackCampaign Campaigns represent a grouping of adversary behaviors and resources with a co... yes
Group Groups represent clusters of adversary activity attributed to a common actor,... no
DataComponent Data Components represent specific types of observable events or artifacts wi... yes
Matrix ATT&CK Matrices define the structural layout and organization of tactics and ... yes

Properties

Type and Range

Property Value
Range StixIdentifier
Domain Of Technique, Tactic, Group, AttackCampaign, Mitigation, AttackMalware, AttackTool, Asset, DataSource, DataComponent, Matrix, Collection, DetectionStrategy, Analytic, AttackRelationship

Cardinality and Requirements

Property Value
### Value Constraints
Property Value
Regex Pattern ^identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5$

In Subsets

Comments

  • validator_hint: must-match-mitre-identity-id

Identifier and Mapping Information

Schema Source

  • from schema: https://w3id.org/lmodel/attack

Mappings

Mapping Type Mapped Value
self attack:x_mitre_modified_by_ref
native attack:x_mitre_modified_by_ref

LinkML Source

name: x_mitre_modified_by_ref
description: 'The STIX ID of the identity object that created the current version
  of this object. In practice, always references MITRE''s canonical identity object:
  identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5. May differ from created_by_ref if
  the object was originally created by a third party and subsequently adopted or updated
  by MITRE.'
comments:
- 'validator_hint: must-match-mitre-identity-id'
in_subset:
- attack_sdos
- attack_sros
from_schema: https://w3id.org/lmodel/attack
rank: 1000
alias: x_mitre_modified_by_ref
domain_of:
- Technique
- Tactic
- Group
- AttackCampaign
- Mitigation
- AttackMalware
- AttackTool
- Asset
- DataSource
- DataComponent
- Matrix
- Collection
- DetectionStrategy
- Analytic
- AttackRelationship
range: stix_identifier
pattern: ^identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5$