Retrieves the most recent threat intelligence reports
Retrieves a specific report by its ID
Searches for malware information in the OpenCTI database
Searches for indicators of compromise
Searches for threat actor information
Retrieves user information by ID
Lists all users in the system
Lists all groups with their members
Lists all attack patterns in the system
Retrieves campaign information by name
Lists all system connectors
Lists all status templates
Retrieves file information by ID
Lists all files in the system
Lists all marking definitions
Lists all available labels
OpenCTI MCP Server provides seamless integration with the Open Cyber Threat Intelligence (OpenCTI) platform. It enables security analysts, threat intelligence teams, and cybersecurity professionals to query and retrieve comprehensive threat intelligence data through a standardized interface. With this MCP, users can search for malware information, indicators of compromise, threat actors, and access detailed reports. The integration also supports user management, STIX object operations, and system administration tasks, making it a powerful tool for organizations looking to leverage their threat intelligence data within AI assistants.
OpenCTI MCP Server connects to your OpenCTI instance, allowing you to query threat intelligence data directly through AI assistants. This integration enables security teams to quickly access critical threat information, search for indicators of compromise, and retrieve detailed reports on threat actors and malware.
Before installing the OpenCTI MCP Server, ensure you have:
git clone https://github.com/Spathodea-Network/opencti-mcp.git
cd opencti-mcp
npm install
npm run build
Create a .env
file based on the provided example:
cp .env.example .env
Edit the .env
file and add your OpenCTI credentials:
OPENCTI_URL=https://your-opencti-instance.com
OPENCTI_TOKEN=your-api-token
Add the OpenCTI MCP Server to your MCP client configuration. The exact location depends on your client, but the configuration should look similar to:
{
"mcpServers": {
"opencti": {
"command": "node",
"args": ["path/to/opencti-mcp/build/index.js"],
"env": {
"OPENCTI_URL": "${OPENCTI_URL}",
"OPENCTI_TOKEN": "${OPENCTI_TOKEN}"
}
}
}
}
Replace path/to/opencti-mcp
with the actual path to your installation.
Once installed, you can use the OpenCTI MCP Server to query threat intelligence data. The server provides various tools for different types of queries:
.env
file or API tokens to version controlIf you encounter issues:
For additional help, refer to the GitHub repository or open an issue.