get_techniques_used_by_group_software
Identify techniques used by threat group software to analyze attack patterns and enhance security monitoring.
Instructions
Get techniques used by group's software
Args: group_stix_id: Group STIX ID to check what software they use, and what techniques that software uses domain: Domain name ('enterprise', 'mobile', or 'ics') include_description: Whether to include description in the output (default is False)
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| group_stix_id | Yes | ||
| domain | No | enterprise | |
| include_description | No |