2017-04-27 14:32:31 +02:00
|
|
|
# mail_to_misp
|
|
|
|
|
|
|
|
Connect your mail client to [MISP](https://github.com/MISP/MISP) in order to create events based on the information contained within mails.
|
|
|
|
|
|
|
|
## Features
|
|
|
|
|
|
|
|
- Extraction of URLs and IP addresses (and port numbers) from free text emails
|
|
|
|
- Extraction of hostnames from URLs
|
|
|
|
- DNS expansion
|
|
|
|
- Custom filter list for lines containing specific words
|
|
|
|
- Subject filters
|
|
|
|
- Respecting TLP classification mentioned in free text (including optional spelling robustness)
|
|
|
|
- Refanging of URLs ('hxxp://...')
|
|
|
|
- Add tags automatically based on key words (configurable)
|
|
|
|
- Add tags automatically depending on the presence of other tags (configurable)
|
|
|
|
- Ignore 'whitelisted' domains (configurable)
|
|
|
|
- Automatically create 'external analysis' links based on filter list (e.g. VirusTotal, malwr.com)
|
|
|
|
|
2017-04-27 14:58:25 +02:00
|
|
|
## Implementation
|
|
|
|
|
|
|
|
For the moment, the implemented workflow is:
|
|
|
|
|
|
|
|
1. `Email -> Apple Mail -> Mail rule -> AppleScript -> python script -> PyMISP -> MISP`
|
|
|
|
|
|
|
|
Thunderbird will be targeted soon.
|
|
|
|
|
|
|
|
## Installation
|
|
|
|
|
|
|
|
### Apple Mail
|
|
|
|
|
|
|
|
1. Mail rule script
|
|
|
|
- git clone this repository
|
|
|
|
- open the AppleScript file MUA/Apple/Mail/MISP Mail Rule Action.txt in Apple's 'Script Editor'
|
|
|
|
- adjust the path to the python installation and location of the mail_to_misp.py script
|
|
|
|
- save it in ~/Library/Application Scripts/com.apple.mail/
|
|
|
|
2. Create a mail rule based on your needs, executing the AppleScript defined before
|
|
|
|
3. Configure mail_to_misp_config.py
|
|
|
|
|
|
|
|
You should be able to create MISP events now.
|
|
|
|
|
|
|
|
|
|
|
|
|
2017-04-27 14:32:31 +02:00
|
|
|
## Requirements
|
|
|
|
|
2017-04-27 15:14:06 +02:00
|
|
|
- mail_to_misp requires access to a MISP instance (via API).
|
|
|
|
- urlmarker from https://github.com/rcompton/ryancompton.net/blob/master/assets/praw_drugs/urlmarker.py (contained in this project)
|
|
|
|
- defang from https://bitbucket.org/johannestaas/defang
|
|
|
|
- Optionally patch defang/defang/__init__.py and add dirty_line = dirty_line.replace('hXXp', 'http') at line 47
|
2017-04-27 14:32:31 +02:00
|
|
|
|
|
|
|
|