Explore GTI relationships for an IOC to discover related entities. Use to expand investigation by finding connected domains, IPs, files, or threat actors. Takes an IOC and relationship types to query.
npx skills add https://github.com/dandye/ai-runbooks --skill pivot-on-iocCLI를 사용하여 이 스킬을 설치하고 작업 공간에서 SKILL.md 워크플로 사용을 시작하세요.
Explore relationships connected to an IOC within Google Threat Intelligence (GTI) to discover related entities for investigation expansion.
IOC_VALUE - The indicator value to pivot fromIOC_TYPE - The type: "IP Address", "Domain", "File Hash", "URL", or "Collection"RELATIONSHIP_NAMES - List of relationships to query (see table below)| IOC Type | Common Relationships |
|---|---|
| IP Address | communicating_files, downloaded_files, referrer_files, resolutions |
| Domain | resolutions, communicating_files, downloaded_files, subdomains, siblings |
| File Hash | contacted_domains, contacted_ips, contacted_urls, dropped_files, embedded_domains |
| URL | communicating_files, downloaded_files, last_serving_ip_address |
| Collection | malware_families, attack_techniques, threat_actors, indicators |
Based on IOC_TYPE:
| IOC Type | Tool |
|---|---|
| IP Address | gti-mcp.get_entities_related_to_an_ip_address |
| Domain | gti-mcp.get_entities_related_to_a_domain |
| File Hash | gti-mcp.get_entities_related_to_a_file |
| URL | gti-mcp.get_entities_related_to_an_url |
| Collection | gti-mcp.get_entities_related_to_a_collection |
For each relationship in RELATIONSHIP_NAMES:
[selected_tool](
identifier=IOC_VALUE,
relationship_name=relationship
)
Store results keyed by relationship name.
After completing this skill, you MUST report these outputs:
| Output | Description |
|---|---|
RELATED_ENTITIES |
Dictionary of entities found per relationship |
EXPANDED_IOCS |
Flattened list of all discovered IOCs (IPs, domains, hashes) |
THREAT_CONTEXT |
Threat actor/campaign context if found during pivoting |
PIVOT_STATUS |
Success/failure status of the pivoting |
File Hash Investigation:
IOC_VALUE: "abcdef123456..."
IOC_TYPE: "File Hash"
RELATIONSHIP_NAMES: ["contacted_domains", "contacted_ips", "dropped_files"]
Domain Investigation:
IOC_VALUE: "suspicious-domain.com"
IOC_TYPE: "Domain"
RELATIONSHIP_NAMES: ["resolutions", "communicating_files", "subdomains"]