get_objects_by_name
Search the MITRE ATT&CK knowledge base for specific threat intelligence objects by name and type to support cybersecurity analysis and threat modeling.
Instructions
Get objects by name (case-sensitive)
Args: name: Name of the object to search for stix_type: TheSTIX object type (must be 'attack-pattern', 'malware', 'tool', 'intrusion-set', 'campaign', 'course-of-action', 'x-mitre-matrix', 'x-mitre-tactic', 'x-mitre-data-source', 'x-mitre-data-component', or 'x-mitre-asset') domain: Domain name ('enterprise', 'mobile', or 'ics') include_description: Whether to include description in the output (default is False)
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | ||
| stix_type | Yes | ||
| domain | No | enterprise | |
| include_description | No |