Respond to a reported phishing email following PICERL methodology. Use when a phishing email is reported or detected. Analyzes artifacts, identifies recipients who clicked, contains malicious IOCs, and removes emails from mailboxes.
84
81%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Structured workflow for responding to reported phishing emails using the PICERL model.
CASE_ID - SOAR case ID for the incidentALERT_GROUP_IDENTIFIERS - Alert group identifiers from SOARREPORTED_EMAIL_ARTIFACTS - Information about the email:
After completing each phase, you MUST report these outputs:
| Output | Description |
|---|---|
PHISHING_URLS | URLs extracted from email body |
PHISHING_IOCS | Confirmed malicious indicators (URLs, domains, hashes) |
AFFECTED_USERS | All users who received the email |
CLICKED_USERS | Users who clicked/interacted with malicious content |
PHISHING_CATEGORY | Type: credential phish, spear phishing, BEC, malware delivery |
| Output | Description |
|---|---|
BLOCKED_IOCS | IOCs blocked at email gateway/proxy/firewall |
CONTAINED_USERS | User accounts with restrictions applied |
ISOLATED_ENDPOINTS | Endpoints isolated due to suspicious activity |
| Output | Description |
|---|---|
DELETED_EMAILS | Count of malicious emails removed from mailboxes |
QUARANTINED_EMAILS | Emails moved to quarantine |
| Output | Description |
|---|---|
RESTORED_ACCOUNTS | User accounts restored to normal access |
USER_NOTIFICATIONS | Users notified of incident and required actions |
Step 2.1: Get Context & Check Duplicates
secops-soar.get_case_full_details(case_id=CASE_ID)Use /check-duplicates.
Step 2.2: Analyze Email Artifacts
Extract from email:
EXTRACTED_URLSEXTRACTED_HASHESStep 2.3: Enrich Extracted IOCs
For each IOC (URLs, domains, IPs, hashes):
Use /enrich-ioc:
/enrich-ioc IOC_VALUE IOC_TYPEIdentify confirmed malicious IOCs → MALICIOUS_IOCs.
Step 2.4: Categorize Phishing Type
| Category | Indicators |
|---|---|
| Generic Credential Phish | Broad targeting, brand impersonation (Microsoft, Google) |
| Spear Phishing | Personalized, targets specific individuals |
| Whaling | Targets executives |
| BEC | Wire transfer requests, no malicious links |
| Brand Impersonation | Mimics known brands |
| Malware Delivery | Focus on attachments or download links |
Document: PHISHING_CATEGORY
Step 2.5: Search for Related Activity (SIEM)
secops-mcp.search_security_events(
text="Network connections or DNS to MALICIOUS_IOCs",
hours_back=72
)Look for:
Step 2.6: Identify Impact
SIMILAR_EMAIL_RECIPIENTS - Who else received itPOTENTIAL_COMPROMISED_USERS - Who clicked/interactedSUSPICIOUS_ENDPOINTS - Endpoints with related activityStep 2.7: Document Identification
Use /document-in-case with findings.
Step 3.1: Block Network IOCs
For each IOC in MALICIOUS_IOCs:
Use /confirm-action:
"Block domain/IP/URL [VALUE]?"
If confirmed, implement blocks at:
Step 3.2: Contain Potentially Compromised Users
For each user in POTENTIAL_COMPROMISED_USERS:
Trigger /respond-compromised-account
Step 3.3: Isolate Suspicious Endpoints
For each endpoint in SUSPICIOUS_ENDPOINTS:
Use /confirm-action:
"Isolate endpoint [HOSTNAME]?"
Step 3.4: Verify Containment
Monitor for continued activity to blocked IOCs.
Use /document-in-case with containment status.
Step 4.1: Delete Malicious Emails
(Requires Email Gateway/Platform tools)
Search all mailboxes for:
Delete/quarantine identified emails. Document count of emails removed.
Step 4.2: Address Malware (If Applicable)
If phishing led to malware execution:
→ Trigger /respond-malware
Step 4.3: Document Eradication
Use /document-in-case with email deletion counts and actions.
Step 5.1: User Account Recovery
If accounts disabled during containment:
Step 5.2: Endpoint Recovery
If endpoints isolated:
Step 5.3: Validate Countermeasures
After lifting blocks, verify legitimate traffic isn't blocked.
Step 5.4: User Communication
Notify affected users:
Use /generate-report with:
Conduct review:
4d132c7
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.