Atomic Runbook: Get Domain Threat Intel via SecOps MCP#
ID: RB-ATOM-DOMAIN-002
Version: 1.0
Last_Updated: 2025-05-30
Purpose: To retrieve general threat intelligence about a domain/FQDN using the Chronicle secops-mcp
get_threat_intel
tool. This is often used for broader context or as an alternative if specialized tools are inconclusive.
Parent_Runbook(s)/Protocol(s): rules-bank/indicator_handling_protocols.md#2-atomic-indicator-domain-name--fqdn
, rb_domain_get_gti_report.md
(as potential next step)
Trigger: When a domain/FQDN requires external threat intelligence, potentially after an initial GTI check, or if narrative context is desired.
Inputs Required#
domain_name
: string - The domain name or FQDN to query.Source Example: Alert field, output from other enrichment runbooks.
gti_confidence
(optional): string - Confidence level from a preceding GTI check (e.g., “Low_Risk_GTI”). Used for context.
Execution Steps#
Tool Selection:
Primary_Tool_MCP_Server:
secops-mcp
Primary_Tool_Name:
get_threat_intel
Parameter Mapping:
Construct a query string for the MCP Tool.
query
: “Provide threat intelligence summary for domain {domain_name}”
Execute Tool: Call the
get_threat_intel
tool with the constructedquery
.AI Agent Note: Refer to
rules-bank/mcp_tool_best_practices.md
for guidance onget_threat_intel
.
Data Transformation/Extraction:
Output is a textual summary. AI may need to parse for keywords indicating risk.
Outputs Expected#
secops_ti_summary
: string - The textual threat intelligence summary.identified_keywords
: list (optional) - Keywords extracted by AI (e.g., “malware distribution”, “phishing site”, “benign”).output_status
: string - [“Success”, “Failure”]output_message
: string (if Failure) - Details of the issue.
Decision Logic / Next Steps (If Applicable)#
IF
output_status
is “Success”:IF
secops_ti_summary
contains keywords like “known malicious”, “phishing campaign”, “malware C2” THENFlag Domain as “High_Risk_SecOpsTI”.
Consider proceeding to containment or escalation.
ELSE IF
secops_ti_summary
contains keywords like “suspicious”, “mixed reputation” OR (gti_confidence
was “Medium_Risk_GTI_Needs_Correlation” AND summary is not explicitly benign) THENFlag Domain as “Medium_Risk_SecOpsTI_Needs_Correlation”.
Proceed to
rb_domain_lookup_entity_chronicle.md
.
ELSE
Flag Domain as “Low_Risk_SecOpsTI” (or “Info_Only_SecOpsTI”).
Proceed to
rb_domain_lookup_entity_chronicle.md
.
ELSE (
output_status
is “Failure”):Log error:
output_message
.Escalate to human analyst: “Failed to retrieve SecOps threat intelligence for domain {domain_name}.”
AI Agent Execution Notes#
AI should perform NLP on
secops_ti_summary
to extractidentified_keywords
for automated decision branching.Context from previous checks (like
gti_confidence
) should inform interpretation of this tool’s output.
Metrics Collection Points#
Log execution time.
Log
output_status
.(Reference
rules-bank/ai_performance_logging_requirements.md
)
References#
rules-bank/mcp_tool_best_practices.md
rules-bank/indicator_handling_protocols.md
rules-bank/ai_performance_logging_requirements.md