Explore GTI relationships for an IOC to discover related entities. Use to expand investigation by finding connected domains, IPs, files, or threat actors. Takes an IOC and relationship types to query.
88
Does it follow best practices?
If you maintain this skill, you can automatically optimize it using the tessl CLI to improve its score:
npx tessl skill review --optimize ./path/to/skillValidation for skill structure
Explore relationships connected to an IOC within Google Threat Intelligence (GTI) to discover related entities for investigation expansion.
IOC_VALUE - The indicator value to pivot fromIOC_TYPE - The type: "IP Address", "Domain", "File Hash", "URL", or "Collection"RELATIONSHIP_NAMES - List of relationships to query (see table below)| IOC Type | Common Relationships |
|---|---|
| IP Address | communicating_files, downloaded_files, referrer_files, resolutions |
| Domain | resolutions, communicating_files, downloaded_files, subdomains, siblings |
| File Hash | contacted_domains, contacted_ips, contacted_urls, dropped_files, embedded_domains |
| URL | communicating_files, downloaded_files, last_serving_ip_address |
| Collection | malware_families, attack_techniques, threat_actors, indicators |
Based on IOC_TYPE:
| IOC Type | Tool |
|---|---|
| IP Address | gti-mcp.get_entities_related_to_an_ip_address |
| Domain | gti-mcp.get_entities_related_to_a_domain |
| File Hash | gti-mcp.get_entities_related_to_a_file |
| URL | gti-mcp.get_entities_related_to_an_url |
| Collection | gti-mcp.get_entities_related_to_a_collection |
For each relationship in RELATIONSHIP_NAMES:
[selected_tool](
identifier=IOC_VALUE,
relationship_name=relationship
)Store results keyed by relationship name.
After completing this skill, you MUST report these outputs:
| Output | Description |
|---|---|
RELATED_ENTITIES | Dictionary of entities found per relationship |
EXPANDED_IOCS | Flattened list of all discovered IOCs (IPs, domains, hashes) |
THREAT_CONTEXT | Threat actor/campaign context if found during pivoting |
PIVOT_STATUS | Success/failure status of the pivoting |
File Hash Investigation:
IOC_VALUE: "abcdef123456..."
IOC_TYPE: "File Hash"
RELATIONSHIP_NAMES: ["contacted_domains", "contacted_ips", "dropped_files"]Domain Investigation:
IOC_VALUE: "suspicious-domain.com"
IOC_TYPE: "Domain"
RELATIONSHIP_NAMES: ["resolutions", "communicating_files", "subdomains"]67a00be
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.