Mitre Attack - Extract Technique Information From ID
MITRE ATT&CK Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.2.0 and later.
This playbook accepts as input MITRE techniques IDs.
It returns the MITRE technique name and full technique data using the MITRE integration.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsFeedMitreAttackv2
#
ScriptsThis playbook does not use any scripts.
#
Commands- attack-pattern
- mitre-get-indicator-name
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
TechniqueID | Accepts a single MITRE technique ID or array of technique IDs, for example: T1210 | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
AttackPattern | Array of attack pattern names and IDs. | string |
MITREATTACK | Full MITRE data for the attack pattern. | string |
#
Playbook Image![MITRE - Extract and Associate to Incident]!(../docfiles/Mitre_Attack-_Extract_Technique_Information_From_ID.png)