get_procedure_examples_by_technique
Find real-world attack examples showing how threat groups implement specific MITRE ATT&CK techniques to analyze security procedures and understand adversary behavior.
Instructions
Get procedure examples by technique STIX ID (shows how groups use a technique)
Args: technique_stix_id: Technique STIX ID to check how they are used and in what procedure domain: Domain name ('enterprise', 'mobile', or 'ics') include_description: Whether to include description in the output (default is False)
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| technique_stix_id | Yes | ||
| domain | No | enterprise | |
| include_description | No |