Ironscales

Prev Next
Self Service Ingestion

Connect this data source on your own, using the Hunters platform.

TL;DR

Supported data types

3rd party detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Ironscales Incidents

✅

✅

ironscales_incidents

NDJSON

API


Overview

imageIRONSCALES is an integrated cloud email security (ICES) platform that provides businesses with a complete phishing protection software solution for enterprise email security. The IRONSCALESâ„¢ cloud-native, API-based email security platform is continuously learning, detecting, and remediating advanced threats at the mailbox level, before and after email delivery.

Integrating Ironscales into Hunters allows the collection and ingestion of key data types into the data lake. Furthermore, alerts will be created over the logs, auto-investigated and correlated to other related signals.

Supported data types

Ironscales Incidents

Table name: ironscales_incidents

Ironscales incidents are generated when the system detects email activities that deviate from the norm or match known threat patterns. These incidents can range from suspicious email content and phishing attempts to impersonation attacks and malware distribution. The incidents are flagged for review, and depending on the configuration, can be automatically remediated or escalated for further investigation by the security team.

📘Ironscales Incidents Collection Frequency

The Ironscales API allows the collection of Incidents on several time intervals, the least of which is 24 hours. Hence, Hunters are collecting the data on a daily basis.

Send data to Hunters

Hunters supports the collection of logs from Ironscales using API.

To connect Ironscales logs:

  1. Acquire the following details from your Ironscales platform, following this guide:

    • Host - for example appapi.eu.ironscales.com

    • Company ID - for example 12345

    • Key - you API key

      📘Note

      Please use the company.all scopes for the API permissions.

  2. Complete the process on the Hunters platform, following this guide.

Expected format

Ironscales Incidents

Logs are expected in JSON format.

{"company_id": 12345, "company_name": "company1", "incident_id": 123456, "classification": "Attack", "first_reported_by": "test person", "first_reported_date": "2023-07-04T09:29:29.317504Z", "affected_mailbox_count": 2, "sender_reputation": "low", "banner_displayed": "First Time Sender", "sender_email": "test-onsite@dialog.kern-sohn.com", "reply_to": "test-onsite@kern-sohn.com", "spf_result": "pass", "sender_is_internal": false, "themis_proba": 0.66, "themis_verdict": "Phishing", "mail_server": {"host": "demo.sendnode.com", "ip": "111.11.111.11"}, "federation": {"companies_affected": 0, "companies_marked_phishing": 0, "companies_marked_spam": 0, "companies_marked_fp": 0, "companies_unclassified": 0, "phishing_ratio": null}, "reports": [{"name": "abcd", "email": "test.hans@ch.test.com", "subject": "[EXT] Ihre pers00f6nliche, H00e4berle!", "sender_email": "test-onsite@dialog.com", "mail_server": {"host": "mda33e.test.com", "ip": "111.11.111.62"}, "headers": [{"name": "Received", "value": "from E456TGFE.eurprd01.prod.labs.com (2603:10a6:20b:4f5::22) by HGFDEW345678.eurprd01.prod.testlabs.com with HTTPS; Tue, 4 Jul 2023 09:22:38 +0000"}]}], "links": [{"url": "https://test.kern-sohn.com/-link2/21808/1912/10/185/577/MyiC5rLm/vPDkGTRThD/0/NTc3/TXlpQzVyTG0./dlBEa0dUUlRoRA../~?mc_phishing_protection_id=28398-cihu9n1tdqlcnmf2i590", "name": "Im Test 00f6ffnen"}, {"url": "https://dialog.kern-sohn.com/-link2/21808/1912/30/215/577/MyiC5rLm/vPDkGTRThD/0?mc_phishing_protection_id=28398-cihu9n1tdqlcnmf2i590", "name": "Datenschutz"}], "attachments": [{"file_name":"image001.jpg","file_size": 80630,"md5": "9caf02efad784208ccbeb99475ec20cd"},{"file_name": "image002.jpg","file_size": 91938,"md5": "551729e2e709e172d71f0bc8b5561ef4"}]}