End-of-Life (EoL)

Auto Extract Indicators from a Phishing Email

use case auto extract, use case auto-extract, auto-extract example, auto extract example
The following scenario shows how Auto Extract is used in the
Process Email - Generic
playbook to automatically extract and enrich a very specific group of indicators.
This playbook parses the headers in the original email used in a phishing attack. It is important to parse the original email used in the phishing attack and not the email that was forwarded to ensure that you only extract the email headers from the malicious email and not the one your organization uses to report phishing attacks.
  1. Navigate to the
    Playbooks
    page and search for the
    Process Email - Generic
    playbook.
  2. Open the
    Add original email details to context
    task, click
    Set
    and select
    ParseEmailFiles
    .
    Under the
    Outputs
    tab you can see all of the different data that the task extracts.
  3. Navigate to the
    Advanced
    tab.
    Under
    Auto extract indicators
    , ensure that the
    Inline
    option is selected. This indicates that all of the outputs will be processed before the playbook moves ahead to the next task.
  4. Open the
    Display email information in layout
    task. This task receives the data from the saved attachment tasks and sets the various data points to context.
    Under the
    Advanced
    tab, ensure that
    Auto extract indicators
    is set to
    None
    because the indicators have already been extracted earlier in the
    Extract email artifacts and attachments
    task and there is no need to do it again..

Recommended For You