Skip to content

Mimecast Impersonation

Mimecast

About

Mimecast Impersonation is an advanced email security technology that protects employees against targeted social engineering attacks in email.

Product Details

Vendor URL: Mimecast Impersonation

Product Type: Mail

Product Tier: Tier II

Integration Method: Custom

Integration URL: Mimecast integration

Log Guide: Log Files - Mimecast logs

Parser Details

Log Format: JSON

Expected Normalization Rate: near 100%

Data Label: MIMECAST_IMPERSONATION_LOGS

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
description metadata.description
"Mimecast" metadata.product_name
"Impersonation Logs" metadata.vendor_name
id metadata.product_log_id
senderAddress network.email.from
messageId network.email.mail_id
subject network.email.subject
recipientAddress network.email.to
senderIpAddress principal.ip
action security_result.action_details
identifier security_result.category_details
impersonationResults security_result.detection_fields
definition security_result.threat_id

Product Event Types

type UDM Event Classification
All EMAIL_TRANSACTION

Log Sample

{"action":"none","definition":"Newly Observed Domains","eventTime":"2023-05-18T15:19:28+0000","hits":1,"id":"MTOKEN:id_number","identifiers":["newly_observed_domain"],"impersonationResults":[{"impersonationDomainSource":"newly_observed_domain","similarDomain":"similar_domain_value","stringSimilarToDomain":"similar_string"}, {"impersonationDomainSource":"newly_observed_domain1","similarDomain":"similar_domain_value1","stringSimilarToDomain":"similar_string_value1"}],"messageId":"<messageId>","recipientAddress":"emailto@someemail.com","senderAddress":"senderemail@someemail.com","senderIpAddress":"10.10.236.159","subject":"Email subject!","taggedExternal":true,"taggedMalicious":true}

Sample Parsing

metadata.event_type = "EMAIL_TRANSACTION"
metadata.product_log_id = "MTOKEN:id_number"
metadata.product_name = "Impersonation Logs"
metadata.vendor_name = "Mimecast"
metadata.description = "Newly Observed Domains"
additional.fields.key = "taggedExternal"
additional.fields.value.string_value = "true"
additional.fields.key = "taggedMalicious"
additional.fields.value.string_value = "true"
principal.ip = "10.10.236.159"
security_result.action_details = "none"
security_result.category_details = "newly_observed_domain"
security_result.detection_fields.key = "similarDomain_0"
security_result.detection_fields.value = "similar_domain_value"
security_result.detection_fields.key = "stringSimilarToDomain_0"
security_result.detection_fields.value = "similar_string"
security_result.detection_fields.key = "impersonationDomainSource_0"
security_result.detection_fields.key = "newly_observed_domain"
security_result.detection_fields.key = "impersonationDomainSource_1"
security_result.detection_fields.key = "newly_observed_domain1"
security_result.detection_fields.key = "similarDomain_1"
security_result.detection_fields.key = "similar_domain_value1"
security_result.detection_fields.key = "stringSimilarToDomain_1"
security_result.detection_fields.key = "similar_string_value1"
security_result.threat_id = "Newly Observed Domains"
network.email.from = "senderemail@someemail.com"
network.email.mail_id = "<messageId>"
network.email.subject = "Email subject!"
network.email.to = "emailto@someemail.com"