Connect this data source on your own, using the Hunters platform.
TL;DR
Supported data types | 3rd party detection | Hunters detection | IOC search | Search | Table name | Log format | Collection method |
---|---|---|---|---|---|---|---|
Mail Transfer Agent (MTA) - Receipt Logs | ✅ | mimecast_receipt_logs | NDJSON | API/S3 | |||
Mail Transfer Agent (MTA) - Process Logs | ✅ | mimecast_process_logs | NDJSON | API/S3 | |||
Mail Transfer Agent (MTA) - Delivery Logs | ✅ | mimecast_delivery_logs | NDJSON | API/S3 | |||
Target Threat Protection - Internal Email Protect logs | ✅ | ✅ | mimecast_internal_email_protect_logs | NDJSON | API/S3 | ||
Targeted Threat Protection - Impersonation Protect logs | ✅ | ✅ | mimecast_impersonation_protect_logs | NDJSON | API/S3 | ||
Targeted Threat Protection - URL Protect logs | ✅ | ✅ | mimecast_url_protect_logs | NDJSON | API/S3 | ||
Targeted Threat Protection - Attachment Protect logs | ✅ | ✅ | mimecast_attachment_protect_logs | NDJSON | API/S3 | ||
Mimecast Attachment TTP logs | ✅ | ✅ | mimecast_ttp_attachment_logs | NDJSON | API/S3 | ||
Mimecast URL TTP logs | ✅ | ✅ | mimecast_ttp_url_logs | NDJSON | API/S3 | ||
Mimecast AntiVirus logs | ✅ | ✅ | mimecast_av_logs | NDJSON | API/S3 | ||
Spam Event Thread logs | ✅ | mimecast_spam_event_thread_logs | NDJSON | API/S3 | |||
Message Release Logs | ✅ | mimecast_message_release_logs | NDJSON | API/S3 |
Overview
Mimecast is a cybersecurity company specializing in email security, archiving, and compliance solutions. It provides protection against phishing, malware, ransomware, and email spoofing through advanced threat detection and AI-driven filtering. Mimecast also offers email continuity and disaster recovery services, ensuring businesses can access their emails even during outages. With data loss prevention (DLP) and encryption, it helps organizations safeguard sensitive communications and meet compliance requirements.
Supported data types
Mail Transfer Agent (MTA)
There are 3 stages that each email will go through and each stage is presented as a different data type.
Data type | Description | Table name |
---|---|---|
Receipt Logs | where the MTA receives a new connection for an email. |
|
Process Logs | where Mimecast policies are applied to the email. |
|
Delivery Logs | where the MTA delivers the email to it's intended recipient. |
|
More information about each of the schemas can be found here.
Target Threat Protection
In addition, there are more supported data types that represent malicious activity detected by Mimecast:
Data type | Description | Table name |
---|---|---|
Target Threat Protection - Internal Email Protect logs | Internal Email Protect extends the capabilities of Targeted Threat Protection, by conducting additional security checks on both internal journaled and outbound email. More information about this data type can be found here. |
|
Targeted Threat Protection - Impersonation Protect logs | An impersonation attack typically involves an email that seems to come from a trusted source. More information about this data type can be found here. |
|
Targeted Threat Protection - URL Protect logs | protect your organization against threat posed by phishing and spear phishing attacks in inbound mail. |
|
Targeted Threat Protection - Attachment Protect logs | protects customers from spear phishing and other targeted attacks using email attachments. |
|
Mimecast Attachment TTP logs | Mimecast's Targeted Threat Protection (TTP) for attachments is a security feature designed to protect organizations from malicious email attachments. The "Attachment TTP" part specifically refers to the scanning and analysis of email attachments to detect potential threats such as viruses, malware, or other harmful content before they reach the end user's inbox. |
|
Mimecast URL TTP logs | The URL TTP service scans, rewrites, and checks the safety of URLs contained within email messages to prevent phishing attacks, malware downloads, and other security threats. |
|
Mimecast AntiVirus
Table name: mimecast_av_logs
A record of all emails that are scanned for malware by Mimecast's anti-virus (AV) engine. The logs contain information about the email, such as the sender, recipient, subject, and body, as well as the AV scan results.
Spam Event Thread logs
Table name: mimecast_spam_event_thread_logs
A record of all spam emails that are processed by Mimecast's spam filtering engine. The logs contain information about the email, such as the sender, recipient, subject, body, and spam score, as well as the actions that Mimecast took on the email.
Message Release Logs
Table name: mimecast_message_release_logs
A record of all emails that are released from Mimecast's held queue. The logs contain information about the email, such as the sender, recipient, subject, body, and the reason for release.
Send data to Hunters
You can collect logs using 2 methods:
API - connect your Mimecast instance to Hunters using API by performing a few simple steps.
S3 storage - route logs to an S3 bucket and provide Hunters with the details.
Using API
To connect Mimecast logs:
Follow this guide to generate Mimecast access and secret keys.
📘Note
The email of the user used to create the keys, is the username.
It is important to set the Authentication TTL setting to Never Expires, as detailed in step 4 (Create a new Authentication Profile), sub-section 5, in the above-metioned guide.
The host should be your Mimecast url based on your region, as can be seen here.
Complete the process on the Hunters platform, following this guide.
Using S3 storage
Hunters supports the ingestion of Mimecast logs via an intermediary AWS S3 bucket.
To connect Mimecast logs:
Export your logs from Mimecast to an AWS S3 bucket.
Once the export is completed and the logs are collected to S3, follow the steps in this section.
Hunters expects the data to be divided to prefix per data type, which can be achieved by using the Content-Disposition response header in the Mimecast API. More details can be found here, under the “Understanding the Logs API” section.
Expected format
The supported formats are key-value
, ndjson
. The expected schema is as it returns from the API.
Delivery logs - key-value example
datetime=2017-05-26T19:40:33+0100|aCode=9q_HeIHHPYejZTBsnipWmQ|acc=C0A0|Delivered=true|IP=123.123.123.123|AttCnt=0|Dir=Inbound|ReceiptAck=\250 2.6.0 messageId@mssageId [InternalId=25473608] Queued mail for delivery\|MsgId=messageId@mssageId|Subject=\Auto Reply\|Latency=5618|Sender=from@domain.com|Rcpt=auser@mimecast.com|AttSize=0|Attempt=1|TlsVer=TLSv1|Cphr=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA|Snt=28237|UseTls=Yes|Route=\Mimecast Exchange Route
Delivery logs - ndjson example
{"acc": "ab12", "Delivered": true, "IP": "0.0.0.0", "AttCnt": 0, "Dir": "Outbound"}
Message Release Logs - ndjson example
{"heldReleaseLogs": [{"id": "Sample_id_1", "status": "released", "heldReason": "Aggressive Spam Detection", "messageInfo": "Digest used as Source", "released": "2023-09-12T15:48:48+0000", "operator": {"emailAddress": "<>"}, "fromEnv": {"emailAddress": "test_env@example.com"}, "fromHdr": {"emailAddress": "test_hdr@example.com"}, "to": [{"emailAddress": "test_to@example.com"}], "subject": "Message 1", "attachments": false, "route": "inbound", "size": 112233, "policy": "Aggressive Spam Detection", "spamScore": 10, "detectionLevel": "aggressive", "spamProcessingDetail": {"rbl": {"allow": true, "info": ""}, "greyEmail": false, "spf": {"allow": true, "info": "allow"}, "dkim": {"allow": true, "info": "allow"}, "dmarc": {"allow": false, "info": "softfail"}, "permittedSender": {"allow": true, "info": "none"}, "managedSender": {"allow": true, "info": "unknown"}}}]}
Mimecast Attachment TTP logs
{
"attachmentLogs": [
{
"actionTriggered": "none, none",
"date": "2024-04-02T07:19:57+0000",
"definition": "Attachment Protection - Preemptive Sandbox",
"details": "Safe \r\nTime taken: 0 hrs, 0 min, 2 sec",
"fileHash": "42a7416a467bd68b97cb9674b5f127250c1853cd6a35284ea9ac93718c148bc2",
"fileName": "asd.PDF",
"fileType": "application/pdf",
"messageId": "<asd@koko.test.il>",
"recipientAddress": "koko.shoko@test.com",
"result": "safe",
"route": "inbound",
"senderAddress": "soko@koko.co.il",
"subject": "asd.PDF"
}
]
}
Mimecast URL TTP logs
{
"clickLogs": [
{
"action": "allow",
"actions": "Allow",
"adminOverride": "Allow",
"category": "Customer managed url allow list",
"creationMethod": "User Click",
"date": "2024-04-02T13:45:11+0000",
"emailPartsDescription": [
"Body"
],
"fromUserEmailAddress": "test@test.com",
"messageId": "<SJ0PR02MB883204B8D75B5FC6A5E0CC1089239@SJ0PR02MB8832.test.com>",
"route": "inbound",
"scanResult": "clean",
"sendingIp": "1.2.3.4",
"subject": "Very imporatant email",
"tagMap": {
"CustomerManagedUrls": {
"Allowlisted": [
"ORIGINAL:https://www.google.com/asdaswdasd"
],
"ManagedUrlEntry": [
"https://www.google.com"
]
}
}
]
}