Skip to main content
Glama
stoyky

MITRE ATT&CK MCP Server

by stoyky

get_object_by_attack_id

Retrieve MITRE ATT&CK framework objects by their unique ID to access detailed information about threats, techniques, and defenses for security analysis.

Instructions

Get object by ATT&CK ID (case-sensitive)

Args: attack_id: ATT&CK ID to find associated object for stix_type: TheSTIX object type (must be 'attack-pattern', 'malware', 'tool', 'intrusion-set', 'campaign', 'course-of-action', 'x-mitre-matrix', 'x-mitre-tactic', 'x-mitre-data-source', 'x-mitre-data-component', or 'x-mitre-asset') domain: Domain name ('enterprise', 'mobile', or 'ics') include_description: Whether to include description in the output (default is False)

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
attack_idYes
stix_typeYes
domainNoenterprise
include_descriptionNo

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/stoyky/mitre-attack-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server