Respond to a ransomware incident following PICERL methodology. Use when ransomware is detected or suspected. Orchestrates identification, containment, eradication, and recovery phases. Requires CASE_ID and initial indicators.
Install with Tessl CLI
npx tessl i github:dandye/ai-runbooks --skill respond-ransomware83
Does it follow best practices?
If you maintain this skill, you can automatically optimize it using the tessl CLI to improve its score:
npx tessl skill review --optimize ./path/to/skillValidation for skill structure
Structured workflow for responding to suspected ransomware incidents using the PICERL model.
CASE_ID - SOAR case ID for the incidentALERT_GROUP_IDENTIFIERS - Alert group identifiers from SOARINITIAL_INDICATORS - Initial detection info:
After completing each phase, you MUST report these outputs:
| Output | Description |
|---|---|
AFFECTED_SYSTEMS | Systems confirmed infected with ransomware |
RANSOMWARE_VARIANT | Ransomware family/variant identified |
ENCRYPTION_STATUS | Current encryption state of affected systems |
RANSOMWARE_IOCS | File hashes, ransom note patterns, malicious files |
| Output | Description |
|---|---|
ISOLATED_SYSTEMS | Systems successfully isolated from network |
BLOCKED_IOCS | IOCs blocked at firewall/proxy |
C2_INDICATORS | C2 domains/IPs discovered during containment |
| Output | Description |
|---|---|
CLEANED_SYSTEMS | Systems with malware/persistence removed |
REMOVED_PERSISTENCE | Persistence mechanisms identified and removed |
| Output | Description |
|---|---|
RESTORED_SYSTEMS | Systems restored to operational state |
VALIDATION_STATUS | Post-recovery validation results |
Prerequisites - verify before proceeding:
Step 2.1: Get Context
secops-soar.get_case_full_details(case_id=CASE_ID)Use /check-duplicates to verify this isn't already under investigation.
Step 2.2: Identify Ransomware Strain
If file hash available:
gti-mcp.get_file_report(hash=FILE_HASH)If name/family known:
gti-mcp.search_threats(query="LockBit ransomware", collection_type="malware-family")Document: IDENTIFIED_STRAIN
Step 2.3: Investigate Initial Access & Lateral Movement
Search SIEM for activity BEFORE encryption:
secops-mcp.search_security_events(
text="Suspicious logins, RDP, exploit attempts for affected endpoints",
hours_back=168
)Look for:
Identify: INITIAL_ACCESS_VECTOR, POTENTIAL_ADDITIONAL_SYSTEMS
Step 2.4: Initial Scope Assessment
Compile:
AFFECTED_ENDPOINTS - Confirmed infected systemsMALICIOUS_IOCs - Network IOCs (C2 domains/IPs)Step 2.5: Check Related Cases
Use /find-relevant-case with affected entities.
Step 2.6: Document
Use /document-in-case with identification findings.
CRITICAL: Speed is essential. Contain first, investigate deeper later.
Step 3.1: Isolate Affected Endpoints
For each endpoint in AFFECTED_ENDPOINTS and POTENTIAL_ADDITIONAL_SYSTEMS:
Use /confirm-action:
"Isolate endpoint [HOSTNAME] from network?"
If confirmed, trigger endpoint isolation (via EDR or network).
Step 3.2: Block Network IOCs
For each IOC in MALICIOUS_IOCs:
Use /confirm-action:
"Block IOC [VALUE] at firewall/proxy?"
If confirmed, implement blocks.
Step 3.3: Contain User Accounts
If compromised user identified:
→ Trigger /respond-compromised-account
Step 3.4: Verify Containment
Monitor SIEM for continued activity:
secops-mcp.search_security_events(
text="Activity from contained systems or IOCs",
hours_back=1
)Use /document-in-case with containment status.
Step 4.1: Identify Persistence
Review GTI reports for known persistence TTPs of IDENTIFIED_STRAIN.
Common mechanisms:
Step 4.2: Remove Malware & Persistence
(Requires EDR/endpoint tools)
Step 4.3: Scan Systems
Perform thorough AV/EDR scans on affected systems.
Use /document-in-case with eradication actions.
Step 5.1: Check Decryptor Availability
Based on IDENTIFIED_STRAIN, check:
Step 5.2: Determine Recovery Strategy
Options:
Step 5.3: Execute Recovery
(Involves IT Ops/System Admins)
Step 5.4: Monitor & Lift Containment
Use /document-in-case with recovery status.
Use /generate-report with comprehensive incident report.
Conduct post-incident review:
| Phase | Key Actions | Skills Used |
|---|---|---|
| Identification | Strain ID, scope | /check-duplicates, /find-relevant-case |
| Containment | Isolate, block | /confirm-action, /document-in-case |
| Eradication | Remove persistence | EDR tools |
| Recovery | Restore systems | IT Ops coordination |
| Lessons Learned | Report, review | /generate-report |
67a00be
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.