Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Mimecast Secure Email Gateway - Attachment Protect

Back
Id72264f4f-61fb-4f4f-96c4-635571a376c2
RulenameMimecast Secure Email Gateway - Attachment Protect
DescriptionDetect threat for mail attachment under the targeted threat protection
SeverityHigh
TacticsCollection
Exfiltration
Discovery
InitialAccess
Execution
TechniquesT1114
T1566
T0865
Required data connectorsMimecastSIEMAPI
KindScheduled
Query frequency5m
Query period15m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/MimecastSEG/Analytic Rules/MimecastSIEM_Attachment.yaml
Version1.0.1
Arm template72264f4f-61fb-4f4f-96c4-635571a376c2.json
Deploy To Azure
MimecastSIEM_CL| where mimecastEventId_s=="mail_ttp_attachment"
relevantTechniques:
- T1114
- T1566
- T0865
entityMappings:
- entityType: MailMessage
  fieldMappings:
  - columnName: Sender_s
    identifier: Sender
  - columnName: Recipient_s
    identifier: Recipient
  - columnName: Subject_s
    identifier: Subject
- entityType: IP
  fieldMappings:
  - columnName: IP_s
    identifier: Address
suppressionEnabled: false
version: 1.0.1
enabled: true
id: 72264f4f-61fb-4f4f-96c4-635571a376c2
suppressionDuration: 5h
severity: High
kind: Scheduled
queryFrequency: 5m
description: Detect threat for mail attachment under the targeted threat protection
requiredDataConnectors:
- connectorId: MimecastSIEMAPI
  dataTypes:
  - MimecastSIEM_CL
eventGroupingSettings:
  aggregationKind: SingleAlert
triggerOperator: gt
name: Mimecast Secure Email Gateway - Attachment Protect
tactics:
- Collection
- Exfiltration
- Discovery
- InitialAccess
- Execution
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/MimecastSEG/Analytic Rules/MimecastSIEM_Attachment.yaml
triggerThreshold: 0
queryPeriod: 15m
query: MimecastSIEM_CL| where mimecastEventId_s=="mail_ttp_attachment"
customDetails:
  sha256: sha256_s
  MsgId_s: MsgId_s
  fileName: fileName_s
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: 1d
    enabled: true
    reopenClosedIncident: false
    matchingMethod: AllEntities