MITRE ATT&CK Integration — Query & Enrich with ATT&CK TTP Data

It would help if there was a node for:

My use case:

I’d like a node that:

  • Accepts an event/indicator/description as input (for example, a suspicious domain, file hash, login anomaly, or other behavioural signal)
  • Looks up the corresponding technique(s) from the MITRE ATT&CK taxonomy (Tactics, Techniques, Procedures)
  • Returns metadata such as Technique ID, name, tactic, description, mitigation/detection guidance
  • Enables workflow branches or actions based on the technique (for example: if Technique = “Execution”, then trigger one kind of workflow; if “Exfiltration”, trigger another)
  • Supports periodic lookups or event-driven enrichment, enabling automation of classification, tagging, reporting, and onward actions

Any resources to support this?

Are you willing to work on this?

Yes, I am happy to help where I can.