mirror of https://github.com/MISP/mail_to_misp
a08e086e0c | ||
---|---|---|
MUA/Apple/Mail | ||
README.md | ||
mail_to_misp.py | ||
mail_to_misp_config.py-example | ||
urlmarker.py |
README.md
mail_to_misp
Connect your mail client to MISP in order to create events based on the information contained within mails.
Features
- Extraction of URLs and IP addresses (and port numbers) from free text emails
- Extraction of hostnames from URLs
- DNS expansion
- Custom filter list for lines containing specific words
- Subject filters
- Respecting TLP classification mentioned in free text (including optional spelling robustness)
- Refanging of URLs ('hxxp://...')
- Add tags automatically based on key words (configurable)
- Add tags automatically depending on the presence of other tags (configurable)
- Ignore 'whitelisted' domains (configurable)
- Automatically create 'external analysis' links based on filter list (e.g. VirusTotal, malwr.com)
Implementation
For the moment, the implemented workflow is:
Email -> Apple Mail -> Mail rule -> AppleScript -> python script -> PyMISP -> MISP
Thunderbird will be targeted soon.
Installation
Apple Mail
- Mail rule script
- git clone this repository
- open the AppleScript file MUA/Apple/Mail/MISP Mail Rule Action.txt in Apple's 'Script Editor'
- adjust the path to the python installation and location of the mail_to_misp.py script
- save it in ~/Library/Application Scripts/com.apple.mail/
- Create a mail rule based on your needs, executing the AppleScript defined before
- Configure mail_to_misp_config.py
You should be able to create MISP events now.
Requirements
mail_to_misp requires access to a MISP instance (via API).