Document toolboxDocument toolbox

mail.all.threats

Introduction

This table collects information related to mail threats, spam and phishing attempts.

Source tables

The information displayed is extracted from the following tables:

  • mail.abnormalsecurity.threats

  • mail.agari.phishing_defense.messages

  • mail.egress.defend.phishing_events

  • mail.exchange.messagetracking

  • mail.mimecast.siem.spameventthread

  • mail.mimecast.threat.feed

  • mail.proofpoint.tapsiem

  • mail.proofpoint.tapsiem_v2

  • mail.proofpoint.trap

Table structure

This is the set of columns displayed by this union table, which is the result of the collection of columns present in all source tables:

Extra columns

Fields marked as Extra in the table below are not shown by default in data tables and need to be explicitly requested in the query. You can find them marked as Extra when you perform a query so they can be easily identified. Learn more about this in Selecting unrevealed columns.

Field

Type

Field transformation

Source field name

Extra fields

Field

Type

Field transformation

Source field name

Extra fields

eventdate

timestamp

 

 

 

machine

str

 

 

 

source

str

 

 

 

sender_ip

str

 

 

 

sender_ipv4

ip4

ip4(sender_ip)

sender_ip

 

subject

str

 

 

 

msg_id

str

 

 

 

hostname

str

 

 

 

recipient

str

 

 

 

sender

str

 

 

 

receiver

str

 

 

 

cc

str

 

 

 

bcc

str

 

 

 

action

str

 

 

 

spam_score

int4

 

 

 

attack_type

str

 

 

 

attachment_names

str

 

 

 

attachment_size_string

str

join(attachment_size, ',')

attachment_size

 

attachment_extension

str

 

 

 

rawMessage

str

 

rawSource

hostchain

str

 

 

tag

str

 

 

Field transformations

Even though all source tables have several features in common, they have some particularities that make it necessary to undergo a set of transformations to harmonize them for the union table. The most common transformations comprise changes in the data type or the application of rules when several columns in the source table feed a single column in the union table. You can find below the detailed list of transformations in each source table.