Overview
Phishing Triage Workflow is an automated tool designed to streamline the analysis of suspicious emails. By parsing .eml files, the tool extracts critical Indicators of Compromise (IOCs), performs risk scoring based on various heuristics, and generates structured reports for security analysts.
The primary goal of this project is to reduce the manual effort required for initial phishing triage, allowing responders to quickly identify high-risk emails and take automated containment actions.
Features
- Email Parsing: Extract headers, body content (HTML and Plain Text), and attachment metadata from
.emlfiles. - IOC Extraction: Automatically identify URLs, domains, IP addresses, email addresses, and file hashes within the email.
- Risk Scoring: Weighted scoring system analyzing:
- SPF/DKIM/DMARC authentication failures.
- Header mismatches (e.g.,
Fromvs.Return-Path). - Mismatched anchor links (Visible text vs. actual destination).
- Presence of URL shorteners.
- Dangerous attachment types (e.g.,
.exe,.vbs,.js).
- Multiple Input Support: Analyze single files, multiple files, or entire directories of samples.
- Actionable Reporting: Generate reports in Markdown or JSON format for integration with SOAR platforms or manual review.
Usage
Analyze a Single Email
|
|
Analyze a Directory of Samples
|
|
Export JSON Report
|
|
Sample Output
The tool provides a clear verdict and risk score, highlighting the reasons for the classification:
|
|
Learning Outcomes
This project demonstrates practical implementation of automated threat analysis workflows.
Key skills developed:
- Advanced EML/MIME parsing in Python.
- Regular expression patterns for IOC extraction.
- Designing weighted risk-scoring algorithms.
- Automating security analyst workflows.
- Structured data reporting for security outcomes.
Security Research Value
Automating phishing triage is a core component of modern Security Operations (SecOps). This tool helps in:
- Rapidly identifying large-scale phishing campaigns.
- Extracting IOCs for proactive blocking at the perimeter.
- Identifying common phishing techniques through consistent analysis.
- Training newer analysts by providing structured reasoning for phishing verdicts.