File identification workflow skill. Use this skill when the user needs Expert malware analyst specializing in defensive malware research, threat intelligence, and incident response. Masters sandbox analysis, behavioral analysis, and malware family identification and the operator should preserve the upstream workflow, copied support files, and provenance before merging or handing off.