CtrlK
BlogDocsLog inGet started
Tessl Logo

pivot-on-ioc

Explore GTI relationships for an IOC to discover related entities. Use to expand investigation by finding connected domains, IPs, files, or threat actors. Takes an IOC and relationship types to query.

Install with Tessl CLI

npx tessl i github:dandye/ai-runbooks --skill pivot-on-ioc
What are skills?

88

Does it follow best practices?

Validation for skill structure

SKILL.md
Review
Evals

Pivot on IOC Skill

Explore relationships connected to an IOC within Google Threat Intelligence (GTI) to discover related entities for investigation expansion.

Inputs

  • IOC_VALUE - The indicator value to pivot from
  • IOC_TYPE - The type: "IP Address", "Domain", "File Hash", "URL", or "Collection"
  • RELATIONSHIP_NAMES - List of relationships to query (see table below)

Available Relationships by IOC Type

IOC TypeCommon Relationships
IP Addresscommunicating_files, downloaded_files, referrer_files, resolutions
Domainresolutions, communicating_files, downloaded_files, subdomains, siblings
File Hashcontacted_domains, contacted_ips, contacted_urls, dropped_files, embedded_domains
URLcommunicating_files, downloaded_files, last_serving_ip_address
Collectionmalware_families, attack_techniques, threat_actors, indicators

Workflow

Step 1: Select GTI Tool

Based on IOC_TYPE:

IOC TypeTool
IP Addressgti-mcp.get_entities_related_to_an_ip_address
Domaingti-mcp.get_entities_related_to_a_domain
File Hashgti-mcp.get_entities_related_to_a_file
URLgti-mcp.get_entities_related_to_an_url
Collectiongti-mcp.get_entities_related_to_a_collection

Step 2: Query Each Relationship

For each relationship in RELATIONSHIP_NAMES:

[selected_tool](
    identifier=IOC_VALUE,
    relationship_name=relationship
)

Store results keyed by relationship name.

Required Outputs

After completing this skill, you MUST report these outputs:

OutputDescription
RELATED_ENTITIESDictionary of entities found per relationship
EXPANDED_IOCSFlattened list of all discovered IOCs (IPs, domains, hashes)
THREAT_CONTEXTThreat actor/campaign context if found during pivoting
PIVOT_STATUSSuccess/failure status of the pivoting

Example Usage

File Hash Investigation:

IOC_VALUE: "abcdef123456..."
IOC_TYPE: "File Hash"
RELATIONSHIP_NAMES: ["contacted_domains", "contacted_ips", "dropped_files"]

Domain Investigation:

IOC_VALUE: "suspicious-domain.com"
IOC_TYPE: "Domain"
RELATIONSHIP_NAMES: ["resolutions", "communicating_files", "subdomains"]
Repository
dandye/ai-runbooks
Last updated
Created

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.