Select the playbook you want to add indicator
extraction, and click
Edit
.
In the playbook, click a task to open the Edit Task window.
Click the
Advanced
tab.
In the indicator extraction drop down menu, select the
mode you want to use.
Click
OK
.
Extract Indicators from a Phishing Email
The following scenario shows how indicator
extraction is used in the
Process Email - Generic
playbook
to extract and enrich a very specific group of indicators.
This
playbook parses the headers in the original email used in a phishing
attack. It is important to parse the original email used in the
phishing attack and not the email that was forwarded to ensure that
you only extract the email headers from the malicious email and not
the one your organization uses to report phishing attacks.
Navigate to the
Playbooks
page
and search for the
Process Email - Generic
playbook.
Open the
Add original email details to context
task,
click
Set
and select
ParseEmailFiles
.
Under the
Outputs
tab you can see
all of the different data that the task extracts.
Navigate to the
Advanced
tab.
Under
Auto extract indicators
, ensure
that the
Inline
option is selected. This
indicates that all of the outputs will be processed before the playbook
moves ahead to the next task.
Open the
Display email information in layout
task.
This task receives the data from the saved attachment tasks and
sets the various data points to context.
Under the
Advanced
tab, ensure that
Auto extract
indicators
is set to
None
because
the indicators have already been extracted earlier in the