ProofPointTAPMessagesDeliveredV2_CL
| mv-expand todynamic(threatsInfoMap)
| mv-expand todynamic(messageParts)
| extend threatType = tostring(threatsInfoMap.threatType), classification = tostring(threatsInfoMap.classification)
| extend filename = tostring(messageParts.filename)
| where threatType =~ "attachment" and classification =~ "malware"
| summarize filenames = make_set(filename), StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by TimeGenerated, Sender = sender, SenderIPAddress = senderIP, Recipient = tostring(recipient), threatType, classification, Subject = subject
| mv-expand todynamic(Recipient)
| extend RecipientName = tostring(split(Recipient, "@")[0]), RecipientUPNSuffix = tostring(split(Recipient, "@")[1])
| extend SenderName = tostring(split(Sender, "@")[0]), SenderUPNSuffix = tostring(split(Sender, "@")[1])
description: |
'This query identifies a message containing a malware attachment that was delivered.'
triggerThreshold: 0
queryPeriod: 1h
triggerOperator: gt
kind: Scheduled
relevantTechniques:
- T1566.001
query: |
ProofPointTAPMessagesDeliveredV2_CL
| mv-expand todynamic(threatsInfoMap)
| mv-expand todynamic(messageParts)
| extend threatType = tostring(threatsInfoMap.threatType), classification = tostring(threatsInfoMap.classification)
| extend filename = tostring(messageParts.filename)
| where threatType =~ "attachment" and classification =~ "malware"
| summarize filenames = make_set(filename), StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by TimeGenerated, Sender = sender, SenderIPAddress = senderIP, Recipient = tostring(recipient), threatType, classification, Subject = subject
| mv-expand todynamic(Recipient)
| extend RecipientName = tostring(split(Recipient, "@")[0]), RecipientUPNSuffix = tostring(split(Recipient, "@")[1])
| extend SenderName = tostring(split(Sender, "@")[0]), SenderUPNSuffix = tostring(split(Sender, "@")[1])
queryFrequency: 1h
requiredDataConnectors:
- connectorId: ProofpointTAPv2
dataTypes:
- ProofPointTAPMessagesDeliveredV2_CL
name: Malware attachment delivered
severity: Medium
entityMappings:
- fieldMappings:
- identifier: FullName
columnName: Recipient
- identifier: Name
columnName: RecipientName
- identifier: UPNSuffix
columnName: RecipientUPNSuffix
entityType: Account
- fieldMappings:
- identifier: FullName
columnName: Sender
- identifier: Name
columnName: SenderName
- identifier: UPNSuffix
columnName: SenderUPNSuffix
entityType: Account
- fieldMappings:
- identifier: Address
columnName: SenderIPAddress
entityType: IP
version: 1.0.6
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ProofPointTap/Analytic Rules/MalwareAttachmentDelivered.yaml
status: Available
id: 0558155e-4556-447e-9a22-828f2a7de06b
tactics:
- InitialAccess