How to Build a Phishing Playbook Part 1: Preparation