Skip to main content
Glama
stoyky

MITRE ATT&CK MCP Server

by stoyky

get_groups_by_alias

Retrieve MITRE ATT&CK group IDs and descriptions using threat actor aliases to identify and analyze adversary groups across enterprise, mobile, or ICS domains.

Instructions

Get MITRE ATT&CK group ID and description by their alias

Args: alias: alias of a MITRE ATT&CK group domain: Domain name ('enterprise', 'mobile', or 'ics') include_description: Whether to include description in the output (default is False)

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
aliasYes
domainNoenterprise
include_descriptionNo
Behavior2/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

No annotations are provided, so the description carries the full burden. It mentions what the tool returns (ID and description) but does not disclose behavioral traits such as error handling (e.g., if alias not found), rate limits, authentication needs, or response format. The description is minimal and lacks critical operational context for a tool with parameters.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is front-loaded with the core purpose in the first sentence, followed by a structured 'Args:' section that efficiently details parameters. Every sentence earns its place with no redundant information, making it appropriately sized and easy to parse.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness3/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given no annotations and no output schema, the description is incomplete for a tool with parameters. It covers parameter semantics well but lacks behavioral details (e.g., output structure, error cases) and does not reference sibling tools for context. It is adequate for basic use but has clear gaps in operational guidance.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters4/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema description coverage is 0%, so the description must compensate. It adds meaningful semantics for all three parameters: 'alias' is explained as 'alias of a MITRE ATT&CK group', 'domain' specifies allowed values ('enterprise', 'mobile', or 'ics'), and 'include_description' clarifies its purpose and default. This goes beyond the schema's basic titles and types, providing necessary context.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the specific action ('Get MITRE ATT&CK group ID and description') and the resource ('by their alias'), distinguishing it from sibling tools like 'get_all_groups' (which retrieves all groups) and 'get_groups_using_technique' (which filters by technique usage). The verb 'Get' is precise, and the scope is well-defined.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines3/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description implies usage when you have an alias and need group details, but it does not explicitly state when to use this tool versus alternatives like 'get_object_by_attack_id' or 'get_objects_by_name'. There is no mention of prerequisites, exclusions, or comparative guidance with sibling tools, leaving usage context partially inferred.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/stoyky/mitre-attack-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server