Skip to main content
Glama
stoyky

MITRE ATT&CK MCP Server

by stoyky

get_techniques_used_by_group

Retrieve MITRE ATT&CK techniques associated with a specific threat group by providing its STIX ID and domain. Supports enterprise, mobile, and ICS domains with optional technique descriptions.

Instructions

Get all MITRE ATT&CK techniques used by group by group STIX ID

Args: group_stix_id: Group STIX ID belonging to requested MITRE ATT&CK group domain: Domain name ('enterprise', 'mobile', or 'ics') include_description: Whether to include description in the output (default is False)

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
group_stix_idYes
domainNoenterprise
include_descriptionNo

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/stoyky/mitre-attack-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server