Enrich an IOC (IP, domain, hash, URL) with threat intelligence. Use when you need to look up reputation and context for an indicator using GTI and SIEM. Returns threat intel findings, SIEM entity summary, and IOC match status.
93
Does it follow best practices?
Validation for skill structure
Perform standardized enrichment for a single Indicator of Compromise (IOC) using Google Threat Intelligence (GTI) and Chronicle SIEM.
IOC_VALUE - The indicator value (e.g., "198.51.100.10", "evil-domain.com", "abcdef123456...", "http://bad.url/path")IOC_TYPE - The type: "IP Address", "Domain", "File Hash", or "URL"Based on IOC_TYPE, call the appropriate GTI tool:
| IOC Type | Tool | Example |
|---|---|---|
| IP Address | gti-mcp.get_ip_address_report | get_ip_address_report(ip_address="198.51.100.10") |
| Domain | gti-mcp.get_domain_report | get_domain_report(domain="evil-domain.com") |
| File Hash | gti-mcp.get_file_report | get_file_report(hash="abcdef123...") |
| URL | gti-mcp.get_url_report | get_url_report(url="http://bad.url/path") |
Store key findings in GTI_FINDINGS:
Error Handling: If GTI fails (quota exceeded, IOC not found), note the limitation and proceed with SIEM enrichment.
secops-mcp.lookup_entity(entity_value=IOC_VALUE)Store in SIEM_ENTITY_SUMMARY:
secops-mcp.get_ioc_matches()Check if IOC_VALUE appears in results. Store Yes/No in SIEM_IOC_MATCH_STATUS.
After completing this skill, you MUST report these outputs:
| Output | Description |
|---|---|
GTI_FINDINGS | Summary of GTI report (reputation, classification, relationships) |
SIEM_SUMMARY | SIEM entity context (first/last seen, related alerts) |
IOC_MATCH_STATUS | Yes/No - whether IOC appears in recent threat feed matches |
THREAT_SCORE | Numerical threat score (0-100) based on GTI reputation |
MALICIOUS_CONFIDENCE | Confidence level: high, medium, low, or none |
GTI Tools:
get_ip_address_report(ip_address)get_domain_report(domain)get_file_report(hash)get_url_report(url)SIEM Tools:
lookup_entity(entity_value)get_ioc_matches()67a00be
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.