Microsoft Defender for Office 365
Overview
Office 365 is a line of subscription services offered by Microsoft as part of the Microsoft Office product line.
Related Built-in Rules
Benefit from SEKOIA.IO built-in rules and upgrade Office 365 with the following detection capabilities out-of-the-box.
SEKOIA.IO x Office 365 on ATT&CK Navigator
Account Added To A Security Enabled Group
Detection in order to investigate who has added a specific Domain User in Domain Admins or Group Policy Creator Owners (Security event 4728)
- Effort: master
Account Removed From A Security Enabled Group
Detection in order to investigate who has removed a specific Domain User in Domain Admins or Group Policy Creator Owners (Security event 4729)
- Effort: master
CVE-2020-0688 Microsoft Exchange Server Exploit
Detects the exploitation of CVE-2020-0688. The POC exploit a .NET serialization vulnerability in the Exchange Control Panel (ECP) web page. The vulnerability is due to Microsoft Exchange Server not randomizing the keys on a per-installation basis resulting in them using the same validationKey and decryptionKey values. With knowledge of these, values an attacker can craft a special viewstate to use an OS command to be executed by NT_AUTHORITY\SYSTEM using .NET deserialization. To exploit this vulnerability, an attacker needs to leverage the credentials of an account it had already compromised to authenticate to OWA.
- Effort: elementary
CVE-2020-17530 Apache Struts RCE
Detects the exploitation of the Apache Struts vulnerability (CVE-2020-17530).
- Effort: intermediate
CVE-2021-20021 SonicWall Unauthenticated Administrator Access
Detects the exploitation of SonicWall Unauthenticated Admin Access.
- Effort: advanced
CVE-2021-20023 SonicWall Arbitrary File Read
Detects Arbitrary File Read, which can be used with other vulnerabilities as a mean to obtain outputs generated by attackers, or sensitive data.
- Effort: advanced
CVE-2021-22893 Pulse Connect Secure RCE Vulnerability
Detects potential exploitation of the authentication by-pass vulnerability that can allow an unauthenticated user to perform remote arbitrary file execution on the Pulse Connect Secure gateway. It is highly recommended to apply the Pulse Secure mitigations and seach for indicators of compromise on affected servers if you are in doubt over the integrity of your Pulse Connect Secure product.
- Effort: intermediate
Defender for O365 High Severity AIR Alert
Microsoft Defender for Office 365 includes the capability to run Automated investigation and response (AIR) actions. This rule detects when a High severity alert triggers an automated investigation, such as when a potentially malicious URL click was detected, or when a user is restricted from sending email.
- Effort: elementary
Defender for O365 Low Severity AIR Alert Handled Automatically
Microsoft Defender for Office 365 includes the capability to run Automated investigation and response (AIR) actions. This rule detects when a Low or Informational severity alert triggered an automated investigation, and remediation was conducted automatically. Low and Informational alerts include when an email is reported by a user, or when a malicious email is removed after delivery.
- Effort: advanced
Defender for O365 Low Severity AIR Alert Requires Action
Microsoft Defender for Office 365 includes the capability to run Automated investigation and response (AIR) actions. This rule detects when a Low or Informational severity alert triggered an automated investigation, and remediation actions need to be approved or conducted. Low and Informational alerts include when an email is reported by a user, or when a malicious email is removed after delivery.
- Effort: intermediate
Defender for O365 Medium Severity AIR Alert
Microsoft Defender for Office 365 includes the capability to run Automated investigation and response (AIR) actions. This rule detects when a Medium severity alert triggers an automated investigation, such as when suspicious email sending patterns are detected from an account.
- Effort: elementary
Detect requests to Konni C2 servers
This rule detects requests to Konni C2 servers. These patterns come from an analysis done in 2022, September.
- Effort: elementary
Domain Trust Created Or Removed
A trust was created or removed to a domain. An attacker could perform that in order to do lateral movement easily between domains or shutdown the ability of two domains to communicate.
- Effort: advanced
Download Files From Non-Legitimate TLDs
Detects file downloads from non-legitimate TLDs. Additional legitimates TLDs should be filtered according to the business habits.
- Effort: master
Download Files From Suspicious TLDs
Detects download of certain file types from hosts in suspicious TLDs
- Effort: master
Failed Logon Source From Public IP Addresses
A login from a public IP can indicate a misconfigured firewall or network boundary. The sekoia.tags are used to filter internal Ipv4 addresses (10.0.0.0/8 172.16.0.0/12 127.0.0.0/8 169.254.0.0/16 192.168.0.0/16).
- Effort: master
Koadic MSHTML Command
Detects Koadic payload using MSHTML module
- Effort: intermediate
Nimbo-C2 User Agent
Nimbo-C2 Uses an unusual User-Agent format in its implants.
- Effort: intermediate
Office 365 Anti-Phishing Policy Deletion
Detects when the anti-phishing policy is removed from Office 365. By default, Office 365 includes built-in features that help protect users from phishing attacks. This policy specifies the phishing protections to enable or disable, and the actions to apply options.
- Effort: master
Office 365 Anti-Phishing Rule Deletion
Detects the deactivation of the anti-phishing rule from Office 365. The anti-phishing rule specifies the priority and recipient filters (who the policy applies to) for an anti-phish policy.
- Effort: master
Office 365 AtpDetection
Detects when an AtpDetection (Advanced Threat Protection) event from the Office365 ThreatIntelligence service is raised. AtpDetection is a service which secures emails, attachments, and files by scanning them for threats.
- Effort: intermediate
Office 365 DLP Policy Removed
Detects when a DLP (Data Loss Prevention) policy is removed in Office 365. DLP policies defines which resources can be shared and with whom, preventing sensitive information from being leaked.
- Effort: master
Office 365 MCAS Detection Velocity
Detects when Microsoft Cloud App Security identifies two user activities (a single or multiple sessions) originating from geographically distant locations within a time period shorter than the time it would have taken the user to travel from the first location to the second. To use this feature, you must have an Office 365 E5 license (https://docs.microsoft.com/en-us/defender-cloud-apps/get-started?culture=fr-fr&country=FR).
- Effort: master
Office 365 MCAS Inbox Hiding
Detects when Microsoft Cloud App Security identifies that a suspicious inbox rule was set on a user’s inbox. This may indicate that the user account is compromised, and that the mailbox is being used to distribute spam and malware in your organization. To use this feature, you must have an Office 365 E5 license (https://docs.microsoft.com/en-us/defender-cloud-apps/get-started?culture=fr-fr&country=FR).
- Effort: master
Office 365 MCAS New Country
Detects when Microsoft Cloud App Security identifies a sign-in from a country where it has never connected. To use this feature, you must have an Office 365 E5 license (https://docs.microsoft.com/en-us/defender-cloud-apps/get-started?culture=fr-fr&country=FR).
- Effort: master
Office 365 MCAS Repeated Delete
Detects when Microsoft Cloud App Security identifies that a user has deleted an unusually large volume of files. To use this feature, you must have an Office 365 E5 license (https://docs.microsoft.com/en-us/defender-cloud-apps/get-started?culture=fr-fr&country=FR).
- Effort: master
Office 365 MCAS Repeated Failed Login
Detects when Microsoft Cloud App Security identifies a large number of failed login attempts which may indicate a brute-force attempt. To use this feature, you must have an Office 365 E5 license (https://docs.microsoft.com/en-us/defender-cloud-apps/get-started?culture=fr-fr&country=FR).
- Effort: master
Office 365 MCAS Risky IP
Detects when Microsoft Cloud App Security identifies sign-ins from a risky IP address, for example, using an anonymous browser or VPN. To use this feature, you must have an Office 365 E5 license (https://docs.microsoft.com/en-us/defender-cloud-apps/get-started?culture=fr-fr&country=FR).
- Effort: master
Office 365 MailBoxAuditBypassAssociation Option Implementation
Detects the implementation of a MailBoxAuditBypassAssociation option in Office 365. This option is used when you configure a user or computer account to bypass mailbox audit logging, access or actions taken by the user or computer account to any mailbox isn't logged.
- Effort: master
Office 365 Malware Filter Policy Removed
Detects when a malware policy has been deleted in Office 365. A malware filter policy is used to alert administrators that an internal user sent a message that contained malware.
- Effort: master
Office 365 Malware Filter Rule Deletion
Detects when a malware filter rule has been deleted in Office 365. The malware filter rule specifies the priority and recipient filters (who the policy applies to) for a malware filter policy.
- Effort: master
Office 365 Malware Uploaded On OneDrive
Detects when Office 365 identifies a malicious file uploaded to OneDrive. Attackers can use this method to propagate through the network.
- Effort: intermediate
Office 365 Malware Uploaded On SharePoint
Detects when Office 365 identifies a malicious file uploaded to SharePoint. Attackers can use this method to propagate through the network.
- Effort: intermediate
Office 365 Mass Download By A Single User
Identifies when Microsoft Cloud App Security reports that a single user performs more than 50 downloads within 1 minute.
- Effort: master
Office 365 Potential Ransomware Activity Detected
Detects when Microsoft Cloud App Security reports that a user has uploaded files to the cloud that might be infected with ransomware.
- Effort: master
Office 365 Safe Attachment Rule Disabled
Detects when the safe attachment rule has been deleted in Office 365. Safe Attachments is a feature in Microsoft Defender for Office 365 that opens email attachments in a special hypervisor environment to detect malicious activity.
- Effort: master
Office 365 Safelinks Disabled
Detects when a safelink rule has been deleted in Office 365. Safe Links is a feature in Defender for Office 365 that provides URL scanning and rewriting of inbound email messages in mail flow, and time-of-click verification of URLs and links in email messages and other locations.
- Effort: master
Office 365 Unusual Volume Of File Deletion
Detects when Microsoft Cloud App Security identifies that a user has deleted an unusually large volume of files.
- Effort: master
Password Change On Directory Service Restore Mode (DSRM) Account
The Directory Service Restore Mode (DSRM) account is a local administrator account on Domain Controllers. Attackers may change the password to gain persistence.
- Effort: intermediate
Possible Malicious File Double Extension
Detects request to potential malicious file with double extension
- Effort: elementary
Possible Replay Attack
This event can be a sign of Kerberos replay attack or, among other things, network device configuration or routing problems.
- Effort: intermediate
Potential Bazar Loader User-Agents
Detects potential Bazar loader communications through the user-agent
- Effort: elementary
Potential Lemon Duck User-Agent
Detects LemonDuck user agent. The format used two sets of alphabetical characters separated by dashes, for example "User-Agent: Lemon-Duck-[A-Z]-[A-Z]".
- Effort: elementary
ProxyShell Exchange Suspicious Paths
Detects suspicious calls to Exchange resources, in locations related to webshells observed in campaigns using this vulnerability.
- Effort: elementary
RTLO Character
Detects RTLO (Right-To-Left character) in file and process names.
- Effort: elementary
RYUK Ransomeware - martinstevens Username
Detects user name "martinstevens". Wizard Spider is used to add the user name "martinstevens" to the AD of its victims. It was observed in several campaigns; in 2019 and 2020.
- Effort: elementary
Raccoon Stealer 2.0 Legitimate Third-Party DLL Download URL
Detects Raccoon Stealer 2.0 malware downloading legitimate third-party DLLs from its C2 server. These legitimate DLLs are used by the information stealer to collect data on the compromised hosts.
- Effort: elementary
SEKOIA.IO Intelligence Feed
Detect threats based on indicators of compromise (IOCs) collected by SEKOIA's Threat and Detection Research team.
- Effort: elementary
Suspicious URI Used In A Lazarus Campaign
Detects suspicious requests to a specific URI, usually on an .asp page. The website is often compromised.
- Effort: intermediate
TrevorC2 HTTP Communication
Detects TrevorC2 HTTP communication based on the HTTP request URI and the user-agent.
- Effort: elementary
User Account Created
Detects user creation on windows servers, which shouldn't happen in an Active Directory environment. Apply this on your windows server logs and not on your DC logs. One default account defaultuser0
is excluded as only used during Windows set-up. This detection use Security Event ID 4720.
- Effort: master
User Account Deleted
Detects local user deletion
- Effort: master
WCE wceaux.dll Creation
Detects wceaux.dll creation while Windows Credentials Editor (WCE) is executed.
- Effort: intermediate
Microsoft Office365 logs
SEKOIA.IO can pull four categories of logs from Microsoft Office 365 Management API:
- Azure Active Directory audit events (
Audit.AzureActiveDirectory
) - Microsoft Exchange audit events (
Audit.Exchange
) - Microsoft SharePoint audit events (
Audit.SharePoint
) - General audit events not included in the other log categories (
Audit.General
)
The Office 365 Management Activity API Schema documents the schema leveraged by SEKOIA.IO to monitor activities within your organization.
The Audit logging is turned on by default for Microsoft 365 and Office 365 entreprise organizations. However, when setting up an organization, you should verify the auditing status.
Microsoft provides instructions to verify and configure the auditing status for your organization in the article Turn auditing on or off.
Configure
Prerequisites
To send Microsoft 365 logs to SEKOIA.IO, there are some prerequisites:
- Have access to the SEKOIA.IO XDR Operations Center
- Be a Microsoft Office 365 Administrator to consent to the interconnection
To generate logs,:
- For some advanced logs, an Azure Premium P1 or Azure Premium P2 license may be required.
- Configure the Microsoft Office 365 logging in SEKOIA.IO XDR
Collect events
SEKOIA.IO provides an automatical setup to collect Microsoft Office 365 logs. This setup is based on OAuth2.0 as described in this Microsoft documentation.
During the setup, SEKOIA.IO requests the following permissions against Microsoft to pull the logs:
User.Read
andoffline_access
, from the Microsoft Graph API, to read your tenant uuidActivityFeed.Read
, from the Office365 Management API, to activate feed subscription to collect events.
In order to exploit the automatic interconnection method, please follow these steps:
- Login to the Operations Center
- Go to Configure > Intakes, and click on
+ INTAKE
- Choose Office 365 intake by clicking on
CREATE
- Enter the Intake name, select the related Entity and trigger the interconnection by clicking on
Automatically
- In the displayed modal, click on
LOG IN TO OFFICE 365
, thenADD PERMISSION INTO OFFICE 365
- Choose your Office account, review the permissions and grant them to SEKOIA.IO
Important
Once the integration is created on SEKOIA.IO, it may take up to 12 hours for the Microsoft API to make data available for the first time. After validation from the Microsoft API, it will take at least 15 minutes to retrieve the first events.
Alternative mode
If you are unable or you don't want to collect Office 365 logs through the management API, SEKOIA.IO also supports Office 365 log collection through Azure EventHub. Follow this guide for more details on this solution.
Collect Microsoft Defender for Office365 events
If your organization use Microsoft Defender for Office 365, you can forward malware and threat intelligence events to SEKOIA.IO. Refer to this guide to turn on Defender events in the audit logs. These events will be automatically forward with the Office365 integration.
Enjoy your events
You can go to the events page to access your incoming events.
Event Categories
The following table lists the data source offered by this integration.
Data Source | Description |
---|---|
Office 365 account logs |
Authentication events |
Office 365 audit logs |
Some user actions are parsed (e.g. file access) |
In details, the following table denotes the type of events produced by this integration.
Name | Values |
---|---|
Kind | event |
Category | file , iam , network |
Type | change , info |
Event Samples
Find below few samples of events and how they are normalized by SEKOIA.IO.
{
"message": "{\"CreationTime\": \"2020-09-29T08:59:26\", \"Id\": \"e1717ca5-c13e-4382-ad7e-4864faa11e85\", \"Operation\": \"UserLoggedIn\", \"OrganizationId\": \"aa09a079-7796-46a8-a4d4-4d21b0dcf1b2\", \"RecordType\": 15, \"ResultStatus\": \"Succeeded\", \"UserKey\": \"10030000A9F382C6@sekoiacorp.onmicrosoft.com\", \"UserType\": 0, \"Version\": 1, \"Workload\": \"AzureActiveDirectory\", \"ClientIP\": \"1.2.3.4\", \"ObjectId\": \"cc15fd57-2c6c-4117-a88c-83b1d56b4bbe\", \"UserId\": \"user@company.onmicrosoft.com\", \"AzureActiveDirectoryEventType\": 1, \"ExtendedProperties\": [{\"Name\": \"UserAgent\", \"Value\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36\"}, {\"Name\": \"UserAuthenticationMethod\", \"Value\": \"1\"}, {\"Name\": \"RequestType\", \"Value\": \"OAuth2:Authorize\"}, {\"Name\": \"ResultStatusDetail\", \"Value\": \"Redirect\"}, {\"Name\": \"KeepMeSignedIn\", \"Value\": \"True\"}], \"ModifiedProperties\": [], \"Actor\": [{\"ID\": \"cb42ef6c-989f-49d0-86cd-7706b8d14528\", \"Type\": 0}, {\"ID\": \"user@company.onmicrosoft.com\", \"Type\": 5}, {\"ID\": \"10030000A9F382C6\", \"Type\": 3}], \"ActorContextId\": \"aa09a079-7796-46a8-a4d4-4d21b0dcf1b2\", \"ActorIpAddress\": \"1.2.3.4\", \"InterSystemsId\": \"d23dd5d2-ccc8-4928-b7a0-f446a2ca4a90\", \"IntraSystemId\": \"a196489a-9a7c-4824-b35a-5bfdec600c00\", \"SupportTicketId\": \"\", \"Target\": [{\"ID\": \"cc15fd57-2c6c-4117-a88c-83b1d56b4bbe\", \"Type\": 0}], \"TargetContextId\": \"aa09a079-7796-46a8-a4d4-4d21b0dcf1b2\", \"ApplicationId\": \"5e3ce6c0-2b1f-4285-8d4b-75ee78787346\"}",
"event": {
"action": "UserLoggedIn",
"kind": "event",
"code": "15",
"category": [
"authentication"
],
"type": [
"start"
]
},
"@timestamp": "2020-09-29T08:59:26",
"service": {
"name": "AzureActiveDirectory"
},
"user": {
"name": "user@company.onmicrosoft.com",
"id": "10030000A9F382C6@sekoiacorp.onmicrosoft.com",
"email": "user@company.onmicrosoft.com"
},
"organization": {
"id": "aa09a079-7796-46a8-a4d4-4d21b0dcf1b2"
},
"action": {
"id": 15,
"name": "UserLoggedIn",
"target": "network-traffic",
"outcome": "success"
},
"source": {
"ip": "1.2.3.4",
"address": "1.2.3.4"
},
"office365": {
"record_type": 15,
"result_status": "Succeeded",
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "cc15fd57-2c6c-4117-a88c-83b1d56b4bbe"
},
"auth": {
"user_authentication_method": 1,
"request_type": "OAuth2:Authorize",
"result_status_detail": "Redirect",
"keep_me_signed_in": true
}
},
"user_agent": {
"original": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36",
"device": {
"name": "Other"
},
"name": "Chrome",
"version": "85.0.4183",
"os": {
"name": "Linux"
}
},
"related": {
"ip": [
"1.2.3.4"
],
"user": [
"user@company.onmicrosoft.com"
]
}
}
{
"message": "{\"CreationTime\": \"2023-04-17T14:27:09\", \"Id\": \"60eaf0aa-edc3-4f8d-8275-bc82d9500e59\", \"Operation\": \"AirInvestigationData\", \"OrganizationId\": \"774d3f25-d4cf-4544-811f-fdb0e60e9ffd\", \"RecordType\": 64, \"UserKey\": \"AirInvestigation\", \"UserType\": 4, \"Version\": 1, \"Workload\": \"AirInvestigation\", \"ObjectId\": \"60eaf0aa-edc3-4f8d-8275-bc82d9500e59\", \"UserId\": \"AirInvestigation\", \"DeepLinkUrl\": \"https://security.microsoft.com/mtp-investigation/urn:ZappedUrlInvestigation:a10a976\", \"EndTimeUtc\": \"2023-04-17T14:27:07\", \"InvestigationId\": \"urn:ZappedUrlInvestigation:a10a976d-6e3e-4d10-be50-4907183b6f86\", \"InvestigationName\": \"Mail with malicious urls is zapped - urn:ZappedUrlInvestigation:a1\", \"InvestigationType\": \"ZappedUrlInvestigation\", \"LastUpdateTimeUtc\": \"2023-04-17T14:21:59\", \"RunningTime\": 931, \"StartTimeUtc\": \"2023-04-17T14:11:38\", \"Status\": \"Remediated\", \"Data\": \"{\\\"Version\\\":\\\"3.0\\\",\\\"VendorName\\\":\\\"Microsoft\\\",\\\"ProviderName\\\":\\\"OATP\\\",\\\"AlertType\\\":\\\"alert_type_value\\\",\\\"Status\\\":\\\"status_value\\\",\\\"Severity\\\":\\\"severity_value\\\",\\\"IsIncident\\\":true,\\\"CorrelationKey\\\":\\\"correlation_key_value\\\",\\\"Category\\\":\\\"category_value\\\",\\\"SourceAlertType\\\":\\\"source_alert_type_value\\\",\\\"MachineName\\\":\\\"machine_name_value\\\"}\", \"Actions\": [ \"{\\\"$id\\\":\\\"1\\\",\\\"ActionId\\\":\\\"urn:EmailZapper:8ad9417586e14790ba2afed0a7840e65\\\"}\"]}",
"event": {
"action": "AirInvestigationData",
"kind": "alert",
"code": "64",
"start": "2023-04-17T14:11:38",
"end": "2023-04-17T14:27:07"
},
"@timestamp": "2023-04-17T14:27:09",
"service": {
"name": "AirInvestigation"
},
"user": {
"name": "AirInvestigation",
"id": "AirInvestigation"
},
"organization": {
"id": "774d3f25-d4cf-4544-811f-fdb0e60e9ffd"
},
"action": {
"id": 64,
"name": "AirInvestigationData",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 64,
"user_type": {
"code": 4,
"name": "System"
},
"audit": {
"object_id": "60eaf0aa-edc3-4f8d-8275-bc82d9500e59"
},
"investigation": {
"id": "urn:ZappedUrlInvestigation:a10a976d-6e3e-4d10-be50-4907183b6f86",
"name": "Mail with malicious urls is zapped - urn:ZappedUrlInvestigation:a1",
"type": "ZappedUrlInvestigation",
"status": "Remediated",
"alert": {
"type": "alert_type_value",
"provider": {
"name": "OATP",
"status": "status_value"
},
"severity": "severity_value",
"is_incident": true,
"correlation_key": "correlation_key_value",
"category": "category_value",
"source_type": "source_alert_type_value"
}
}
},
"host": {
"name": "machine_name_value"
},
"log": {
"level": "severity_value"
},
"related": {
"user": [
"AirInvestigation"
]
}
}
{
"message": "{\"CreationTime\": \"2023-04-17T14:27:09\", \"Id\": \"60eaf0aa-edc3-4f8d-8275-bc82d9500e59\", \"Operation\": \"AirInvestigationData\", \"OrganizationId\": \"774d3f25-d4cf-4544-811f-fdb0e60e9ffd\", \"RecordType\": 64, \"UserKey\": \"AirInvestigation\", \"UserType\": 4, \"Version\": 1, \"Workload\": \"AirInvestigation\", \"ObjectId\": \"60eaf0aa-edc3-4f8d-8275-bc82d9500e59\", \"UserId\": \"AirInvestigation\", \"DeepLinkUrl\": \"https://security.microsoft.com/mtp-investigation/urn:ZappedUrlInvestigation:a10a976\", \"EndTimeUtc\": \"2023-04-17T14:27:07\", \"InvestigationId\": \"urn:ZappedUrlInvestigation:a10a976d-6e3e-4d10-be50-4907183b6f86\", \"InvestigationName\": \"Mail with malicious urls is zapped - urn:ZappedUrlInvestigation:a1\", \"InvestigationType\": \"ZappedUrlInvestigation\", \"LastUpdateTimeUtc\": \"2023-04-17T14:21:59\", \"RunningTime\": 931, \"StartTimeUtc\": \"2023-04-17T14:11:38\", \"Status\": \"Remediated\", \"Data\": \"{\\\"Version\\\":\\\"3.0\\\",\\\"VendorName\\\":\\\"Microsoft\\\",\\\"ProviderName\\\":\\\"OATP\\\",\\\"AlertType\\\":\\\"alert_type_value\\\",\\\"Status\\\":\\\"status_value\\\",\\\"Severity\\\":\\\"severity_value\\\",\\\"IsIncident\\\":true,\\\"CorrelationKey\\\":\\\"correlation_key_value\\\",\\\"Category\\\":\\\"category_value\\\",\\\"SourceAlertType\\\":\\\"source_alert_type_value\\\",\\\"MachineName\\\":\\\"machine_name_value\\\",\\\"Entities\\\": [{\\\"Urls\\\":[\\\"http://1.2.3.4\\\",\\\"http://1.2.3.5\\\"],\\\"SenderIP\\\":\\\"1.2.3.4\\\",\\\"Subject\\\":\\\"subject_value\\\",\\\"P1SenderDomain\\\":\\\"http://1.2.3.4\\\",\\\"Threats\\\":1,\\\"Sender\\\":\\\"test@test.test\\\",\\\"Recipient\\\":\\\"test1@test.test\\\"},{\\\"Urls\\\":[\\\"http://1.2.3.6\\\",\\\"http://1.2.3.7\\\"],\\\"SenderIP\\\":\\\"1.2.3.8\\\",\\\"Subject\\\":\\\"subject_value_1\\\",\\\"P1SenderDomain\\\":\\\"http://1.2.3.9\\\",\\\"Threats\\\":2,\\\"Sender\\\":\\\"test3@test.test\\\",\\\"Recipient\\\":\\\"test4@test.test\\\"}]}\", \"Actions\": [ \"{\\\"$id\\\":\\\"1\\\",\\\"ActionId\\\":\\\"urn:EmailZapper:8ad9417586e14790ba2afed0a7840e65\\\"}\"]}",
"event": {
"action": "AirInvestigationData",
"kind": "alert",
"code": "64",
"start": "2023-04-17T14:11:38",
"end": "2023-04-17T14:27:07"
},
"@timestamp": "2023-04-17T14:27:09",
"service": {
"name": "AirInvestigation"
},
"user": {
"name": "AirInvestigation",
"id": "AirInvestigation"
},
"organization": {
"id": "774d3f25-d4cf-4544-811f-fdb0e60e9ffd"
},
"action": {
"id": 64,
"name": "AirInvestigationData",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 64,
"user_type": {
"code": 4,
"name": "System"
},
"audit": {
"object_id": "60eaf0aa-edc3-4f8d-8275-bc82d9500e59"
},
"investigation": {
"id": "urn:ZappedUrlInvestigation:a10a976d-6e3e-4d10-be50-4907183b6f86",
"name": "Mail with malicious urls is zapped - urn:ZappedUrlInvestigation:a1",
"type": "ZappedUrlInvestigation",
"status": "Remediated",
"alert": {
"type": "alert_type_value",
"provider": {
"name": "OATP",
"status": "status_value"
},
"severity": "severity_value",
"is_incident": true,
"correlation_key": "correlation_key_value",
"category": "category_value",
"source_type": "source_alert_type_value"
},
"email": {
"urls": [
"http://1.2.3.4",
"http://1.2.3.5",
"http://1.2.3.6",
"http://1.2.3.7"
],
"sender": {
"ip": [
"1.2.3.4",
"1.2.3.8"
],
"domains": [
"http://1.2.3.4",
"http://1.2.3.9"
]
},
"subjects": [
"subject_value",
"subject_value_1"
]
},
"threats": [
"1",
"2"
]
}
},
"host": {
"name": "machine_name_value"
},
"log": {
"level": "severity_value"
},
"email": {
"from": {
"address": [
"test@test.test",
"test3@test.test"
]
},
"to": {
"address": [
"test1@test.test",
"test4@test.test"
]
}
},
"related": {
"user": [
"AirInvestigation"
]
}
}
{
"message": "{\"ActionId\":\"a81edede-be03-41f4-aae2-b6b25186adc6\",\"ActionName\":\"Enable self-service password reset\",\"ActionProducts\":[],\"ActionScore\":26.0,\"ActionScoreChange\":-1.0,\"ActionActivity\":\"COMPLIANCEMANAGER-SCORECHANGE\",\"Assessments\":[],\"Templates\":[],\"Solutions\":[],\"ManagedBy\":\"User\",\"ActionScope\":\"Tenant\",\"UserId\":\"\",\"Id\":\"aa9367e4-9fa3-4709-8326-b35c04f784d2\",\"RecordType\":155,\"CreationTime\":\"2022-10-05T10:12:57\",\"Operation\":\"COMPLIANCEMANAGER-SCORECHANGE\",\"OrganizationId\":\"163381f4-6b9c-43c2-8b57-bfc16b7354f2\",\"UserType\":2,\"UserKey\":\"Organization\",\"Workload\":\"ComplianceManager\",\"ResultStatus\":\"Successful\",\"Version\":1}",
"event": {
"action": "COMPLIANCEMANAGER-SCORECHANGE",
"kind": "event",
"code": "155",
"reason": "Enable self-service password reset"
},
"@timestamp": "2022-10-05T10:12:57",
"service": {
"name": "ComplianceManager"
},
"user": {
"id": "Organization"
},
"organization": {
"id": "163381f4-6b9c-43c2-8b57-bfc16b7354f2"
},
"action": {
"id": 155,
"name": "COMPLIANCEMANAGER-SCORECHANGE",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 155,
"result_status": "Successful",
"user_type": {
"code": 2,
"name": "Admin"
}
}
}
{
"message": "{\"CreationTime\":\"2022-04-05T20:35:01\",\"Id\":\"5615b32d-4c18-4ada-cc88-08da1743c258\",\"Operation\":\"Create\",\"OrganizationId\":\"7f7e5b97-b780-473c-9c76-9182a9d7f2b4\",\"RecordType\":2,\"ResultStatus\":\"Succeeded\",\"UserKey\":\"10033FFF80D15ECF\",\"UserType\":0,\"Version\":1,\"Workload\":\"Exchange\",\"ClientIP\":\"d498:796:298e:be16:1b11:29eb:9996:8a36\",\"UserId\":\"email@example.org\",\"AppId\":\"27922004-5251-4030-b22d-91ecd9a37ea4\",\"ClientIPAddress\":\"d498:796:298e:be16:1b11:29eb:9996:8a36\",\"ClientInfoString\":\"Client=OutlookService;Outlook-iOS/2.0;\",\"ClientRequestId\":\"1725\",\"ExternalAccess\":false,\"InternalLogonType\":0,\"LogonType\":0,\"LogonUserSid\":\"S-1-5-21-3620271904-3241272990-2175486473-1085344\",\"MailboxGuid\":\"24683bc8-fab1-48b3-b834-cb11b95bb911\",\"MailboxOwnerSid\":\"S-1-5-21-3620271904-3241272990-2175486473-1085344\",\"MailboxOwnerUPN\":\"email@example.org\",\"OrganizationName\":\"xxxx.onmicrosoft.com\",\"OriginatingServer\":\"PR3PR03MB6601 (15.20.4200.000)\\r\\n\",\"SessionId\":\"8ad3822b-1cfd-40e7-aeaa-6d0708691ad8\",\"Item\":{\"Id\":\"LgAAAAAdhAMRqmYRzZvIAKoAL8RaDQCB1ldAzYsRRItL+noffZbOAATJxTeHAAAJ\",\"InternetMessageId\":\"<PR3PR03MB6601D07B33E82733537EF049DEE49@PR3PR03MB6601.eurprd03.prod.outlook.com>\",\"IsRecord\":false,\"ParentFolder\":{\"Id\":\"LgAAAAAbOnSFmOkITaMliEZRj+Z3AQAPzmaC0nx3Qo/JWqclreA/AAAEUskDAAAB\",\"Path\":\"\\\\Drafts1\"},\"SizeInBytes\":34785,\"Subject\":\"Email subject\"}}",
"event": {
"action": "Create",
"kind": "event",
"code": "2",
"category": [
"email",
"file"
],
"type": [
"info",
"creation"
]
},
"@timestamp": "2022-04-05T20:35:01",
"service": {
"name": "Exchange"
},
"user": {
"name": "email@example.org",
"id": "10033FFF80D15ECF",
"email": "email@example.org"
},
"organization": {
"id": "7f7e5b97-b780-473c-9c76-9182a9d7f2b4"
},
"action": {
"id": 2,
"name": "Create",
"target": "user",
"outcome": "success"
},
"source": {
"ip": "d498:796:298e:be16:1b11:29eb:9996:8a36",
"address": "d498:796:298e:be16:1b11:29eb:9996:8a36"
},
"office365": {
"record_type": 2,
"result_status": "Succeeded",
"user_type": {
"code": 0,
"name": "Regular"
}
},
"related": {
"ip": [
"d498:796:298e:be16:1b11:29eb:9996:8a36"
],
"user": [
"email@example.org"
]
}
}
{
"message": "{\"CreationTime\": \"2020-09-29T07:32:51\", \"Id\": \"4e597c8c-e185-4ea5-3413-08d86449df74\", \"Operation\": \"FilePreviewed\", \"OrganizationId\": \"aa09a079-7796-46a8-a4d4-4d21b0dcf1b2\", \"RecordType\": 6, \"UserKey\": \"i:0h.f|membership|10032000e70d7559@live.com\", \"UserType\": 0, \"Version\": 1, \"Workload\": \"OneDrive\", \"ClientIP\": \"1.2.3.4\", \"ObjectId\": \"https://company-my.sharepoint.com/personal/jane_doe_company_onmicrosoft_com/Documents/MyDocument.docx\", \"UserId\": \"jane.doe@company.onmicrosoft.com\", \"ApplicationId\": \"4345a7b9-9a63-4910-a426-35363201d503\", \"CorrelationId\": \"41af7e9f-30a8-9000-8f78-756aca9a7474\", \"DoNotDistributeEvent\": \"True\", \"EventSource\": \"SharePoint\", \"ItemType\": \"File\", \"ListId\": \"2db6ee74-6bd7-4d9b-a63f-26ae6eef9fb3\", \"ListItemUniqueId\": \"0e3f3538-8a03-4728-b431-225bc10687b6\", \"Site\": \"2d3c44c1-d225-499d-a47f-bda2751a00b9\", \"UserAgent\": \"OneDriveMpc-Transform_Thumbnail/1.0\", \"WebId\": \"c4b81f7e-4f91-4b3a-97a7-660709edef15\", \"HighPriorityMediaProcessing\": \"False\", \"SourceFileExtension\": \"xlsx\", \"SiteUrl\": \"https://company-my.sharepoint.com/personal/jane_doe_company_onmicrosoft_com/\", \"SourceFileName\": \"MyDocument.docx\", \"SourceRelativeUrl\": \"Documents\"}",
"event": {
"action": "FilePreviewed",
"kind": "event",
"code": "6",
"category": [
"file"
],
"type": [
"info"
]
},
"@timestamp": "2020-09-29T07:32:51",
"service": {
"name": "OneDrive"
},
"user": {
"name": "jane.doe@company.onmicrosoft.com",
"id": "i:0h.f|membership|10032000e70d7559@live.com",
"email": "jane.doe@company.onmicrosoft.com"
},
"organization": {
"id": "aa09a079-7796-46a8-a4d4-4d21b0dcf1b2"
},
"action": {
"id": 6,
"name": "FilePreviewed",
"target": "user",
"outcome": "success",
"properties": [
{
"SourceFileName": "MyDocument.docx",
"SourceRelativeUrl": "Documents",
"SiteUrl": "https://company-my.sharepoint.com/personal/jane_doe_company_onmicrosoft_com/",
"UserAgent": "OneDriveMpc-Transform_Thumbnail/1.0"
}
]
},
"source": {
"ip": "1.2.3.4",
"address": "1.2.3.4"
},
"office365": {
"record_type": 6,
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "https://company-my.sharepoint.com/personal/jane_doe_company_onmicrosoft_com/Documents/MyDocument.docx"
}
},
"file": {
"name": "MyDocument.docx",
"directory": "Documents"
},
"user_agent": {
"original": "OneDriveMpc-Transform_Thumbnail/1.0",
"device": {
"name": "Other"
},
"name": "Other",
"os": {
"name": "Other"
}
},
"url": {
"full": "https://company-my.sharepoint.com/personal/jane_doe_company_onmicrosoft_com/Documents/MyDocument.docx",
"original": "https://company-my.sharepoint.com/personal/jane_doe_company_onmicrosoft_com/Documents/MyDocument.docx",
"domain": "company-my.sharepoint.com",
"top_level_domain": "com",
"subdomain": "company-my",
"registered_domain": "sharepoint.com",
"path": "/personal/jane_doe_company_onmicrosoft_com/Documents/MyDocument.docx",
"scheme": "https",
"port": 443
},
"related": {
"ip": [
"1.2.3.4"
],
"user": [
"jane.doe@company.onmicrosoft.com"
]
}
}
{
"message": "{\"AppAccessContext\":{\"AADSessionId\":\"0e042318-7c78-4acb-ae00-5ee74465bca3\",\"CorrelationId\":\"c299a0a0-14da-428a-b08d-481d562298cb\",\"UniqueTokenId\":\"0000000000000000000000\"},\"CreationTime\":\"2022-06-10T12:00:14\",\"Id\":\"7c13b5d5-aa8d-48d1-b3d1-5f4b657136ba\",\"Operation\":\"FileSyncDownloadedFull\",\"OrganizationId\":\"2d7585dc-97bc-4494-b98c-79f2a4946931\",\"RecordType\":6,\"UserKey\":\"i:0h.f|membership|0000000000000000@live.com\",\"UserType\":0,\"Version\":1,\"Workload\":\"SharePoint\",\"ClientIP\":\"1.2.3.4\",\"ObjectId\":\"https://company.sharepoint.com/sites/shared/public/assets/website/logo.png\",\"UserId\":\"marketing@company.com\",\"CorrelationId\":\"4b25e3d9-1e4f-4c62-a544-da747449f144\",\"EventSource\":\"SharePoint\",\"ItemType\":\"File\",\"ListId\":\"ca07dda5-0cdc-4399-94a6-303a7aa8ac00\",\"ListItemUniqueId\":\"ab5a159c-c8fd-409c-a48f-524c29df0341\",\"Site\":\"1a53ae0f-8405-42ec-8c43-724101fd34a2\",\"UserAgent\":\"Microsoft SkyDriveSync 22.099.0508.0001 ship; Windows NT 10.0 (19043)\",\"WebId\":\"ba71b4fe-22e8-41cf-9eaf-48b1787bad16\",\"MachineDomainInfo\":\"f059d209-e819-402b-a391-4941ff3860c6\",\"MachineId\":\"884ecccb-1e44-4dd4-a2b5-b60517893ce0\",\"FileSyncBytesCommitted\":\"1344200\",\"HighPriorityMediaProcessing\":false,\"SourceFileExtension\":\"png\",\"SiteUrl\":\"https://company.sharepoint.com/sites/shared\",\"SourceFileName\":\"logo.png\",\"SourceRelativeUrl\":\"public/assets/website\"}",
"event": {
"action": "FileSyncDownloadedFull",
"kind": "event",
"code": "6",
"category": [
"file"
],
"type": [
"info"
]
},
"@timestamp": "2022-06-10T12:00:14",
"service": {
"name": "SharePoint"
},
"user": {
"name": "marketing@company.com",
"id": "i:0h.f|membership|0000000000000000@live.com",
"email": "marketing@company.com"
},
"organization": {
"id": "2d7585dc-97bc-4494-b98c-79f2a4946931"
},
"action": {
"id": 6,
"name": "FileSyncDownloadedFull",
"target": "user",
"outcome": "success",
"properties": [
{
"SourceFileName": "logo.png",
"SourceRelativeUrl": "public/assets/website",
"SiteUrl": "https://company.sharepoint.com/sites/shared",
"UserAgent": "Microsoft SkyDriveSync 22.099.0508.0001 ship; Windows NT 10.0 (19043)"
}
]
},
"source": {
"ip": "1.2.3.4",
"address": "1.2.3.4"
},
"office365": {
"record_type": 6,
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "https://company.sharepoint.com/sites/shared/public/assets/website/logo.png"
},
"context": {
"aad_session_id": "0e042318-7c78-4acb-ae00-5ee74465bca3",
"correlation": {
"id": "c299a0a0-14da-428a-b08d-481d562298cb"
}
}
},
"file": {
"name": "logo.png",
"directory": "public/assets/website"
},
"user_agent": {
"original": "Microsoft SkyDriveSync 22.099.0508.0001 ship; Windows NT 10.0 (19043)",
"device": {
"name": "Other"
},
"name": "Microsoft SkyDriveSync",
"version": "22.099.0508",
"os": {
"name": "Windows",
"version": "10"
}
},
"url": {
"full": "https://company.sharepoint.com/sites/shared/public/assets/website/logo.png",
"original": "https://company.sharepoint.com/sites/shared/public/assets/website/logo.png",
"domain": "company.sharepoint.com",
"top_level_domain": "com",
"subdomain": "company",
"registered_domain": "sharepoint.com",
"path": "/sites/shared/public/assets/website/logo.png",
"scheme": "https",
"port": 443
},
"related": {
"ip": [
"1.2.3.4"
],
"user": [
"marketing@company.com"
]
}
}
{
"message": "{\"Id\":\"40094389-7baf-a3ba-5acc-2773c002cfbe\",\"RecordType\":22,\"CreationTime\":\"2022-09-07T12:22:07\",\"Operation\":\"FileVisited\",\"OrganizationId\":\"12b674a1-3497-4997-b4ab-2a40bf0e5139\",\"UserType\":0,\"UserKey\":\"10032001cf3045ad\",\"Workload\":\"Yammer\",\"ResultStatus\":\"TRUE\",\"ObjectId\":\"Pix_C'est la rentre!.png\",\"ClientIP\":\"2503:1026:c0a:70::5\",\"UserId\":\"Frodon.Saquet@comte.com\",\"ActorYammerUserId\":1315924230144,\"ActorUserId\":\"Frodon.Saquet@comte.com\",\"YammerNetworkId\":6358000,\"Version\":1,\"FileId\":1439262310400,\"FileName\":\"Pix_C'est la rentre!.png\",\"VersionId\":1460243079168}",
"event": {
"action": "FileVisited",
"kind": "event",
"code": "22",
"category": [
"file"
]
},
"@timestamp": "2022-09-07T12:22:07",
"service": {
"name": "Yammer"
},
"user": {
"name": "Frodon.Saquet@comte.com",
"id": "10032001cf3045ad",
"email": "Frodon.Saquet@comte.com"
},
"organization": {
"id": "12b674a1-3497-4997-b4ab-2a40bf0e5139"
},
"action": {
"id": 22,
"name": "FileVisited",
"target": "user",
"outcome": "success"
},
"source": {
"ip": "2503:1026:c0a:70::5",
"address": "2503:1026:c0a:70::5"
},
"office365": {
"record_type": 22,
"result_status": "TRUE",
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "Pix_C'est la rentre!.png"
}
},
"file": {
"name": "Pix_C'est la rentre!.png"
},
"related": {
"ip": [
"2503:1026:c0a:70::5"
],
"user": [
"Frodon.Saquet@comte.com"
]
}
}
{
"message": "{\"CreationTime\":\"2022-07-07T22:38:49\",\"Id\":\"266f5962-ffad-4fce-a101-3197581af3d4\",\"Operation\":\"AtpDetection\",\"OrganizationId\":\"7f7e5b97-b780-473c-9c76-9182a9d7f2b4\",\"RecordType\":47,\"UserKey\":\"ThreatIntel\",\"UserType\":4,\"Version\":1,\"Workload\":\"ThreatIntelligence\",\"UserId\":\"people@example.org\",\"DetectionDate\":\"2022-07-07T22:38:11\",\"DetectionMethod\":\"AntiMalware\",\"EventDeepLink\":\"https://protection.office.com/threatexplorer?dltarget=Explorer&dlstorage=Url&viewid=MalwareContent&query-Id=2ab4791e-fdd4-42f9-ad3c-c54ef7a4d548\",\"FileData\":{\"DocumentId\":\"03254108-f682-417d-f3e6-08da605bf091\",\"FileName\":\"malware\",\"FilePath\":\"https://example.sharepoint.com/personal/people_example_org/Documents/malware\",\"FileSize\":\"12345\",\"FileVerdict\":1,\"MalwareFamily\":\"iPhoneOS/Vortex.C\",\"SHA256\":\"SnltYq0lbVwFlAIf+lQugPXaMcDNV9t9pN/Zkhx7hQ8=\"},\"LastModifiedBy\":\"people@example.org\",\"LastModifiedDate\":\"2022-01-01T13:00:53\",\"SourceWorkload\":1}\n",
"event": {
"action": "AtpDetection",
"kind": "event",
"code": "47",
"url": "https://protection.office.com/threatexplorer?dltarget=Explorer&dlstorage=Url&viewid=MalwareContent&query-Id=2ab4791e-fdd4-42f9-ad3c-c54ef7a4d548"
},
"@timestamp": "2022-07-07T22:38:49",
"service": {
"name": "ThreatIntelligence"
},
"user": {
"name": "people@example.org",
"id": "ThreatIntel",
"email": "people@example.org"
},
"organization": {
"id": "7f7e5b97-b780-473c-9c76-9182a9d7f2b4"
},
"action": {
"id": 47,
"name": "AtpDetection",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 47,
"user_type": {
"code": 4,
"name": "System"
},
"defender": {
"detection": {
"method": "AntiMalware"
}
}
},
"related": {
"user": [
"people@example.org"
]
}
}
{
"message": "{\"CreationTime\":\"2022-07-08T09:10:19\",\"Id\":\"50906475-74dd-4447-ae4d-595d225d0055\",\"Operation\":\"TIMailData\",\"OrganizationId\":\"8a457951-a594-4607-a5dc-dfc72338eb13\",\"RecordType\":28,\"UserKey\":\"ThreatIntel\",\"UserType\":4,\"Version\":1,\"Workload\":\"ThreatIntelligence\",\"ObjectId\":\"4ca2df96-4488-4f3b-a265-b4edaa3c4d8f\",\"UserId\":\"ThreatIntel\",\"AdditionalActionsAndResults\":[\"OriginalDelivery: [N/A]\"],\"AttachmentData\":[{\"FileName\":\"malicious.pdf.exe\",\"FileType\":\"exe;zip\",\"FileVerdict\":1,\"MalwareFamily\":\"Trojan_Gen_FileWithSpoofedExtension_A\",\"SHA256\":\"E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855\"}],\"AuthDetails\":[{\"Name\":\"SPF\",\"Value\":\"Pass\"},{\"Name\":\"DKIM\",\"Value\":\"Fail\"},{\"Name\":\"DMARC\",\"Value\":\"Best guess pass\"},{\"Name\":\"Comp Auth\",\"Value\":\"pass\"}],\"DeliveryAction\":\"Blocked\",\"DetectionMethod\":\"File detonation\",\"DetectionType\":\"Inline\",\"Directionality\":\"Inbound\",\"EventDeepLink\":\"https://protection.office.com/?hash=/threatexplorer?messageParams=a4dbf74a-89e0-40de-b14d-df573f48aa45,a4dbf74a-89e0-40de-b14d-df573f48aa45-0000000000000000000-1,2022-07-08T00:00:00,2022-07-08T23:59:59&view=Malware\",\"InternetMessageId\":\"<4cc4a74e-a195-4222-abd7-a8adf2cd347d@sender.com>\",\"LatestDeliveryLocation\":\"Quarantine\",\"MessageTime\":\"2022-07-08T09:07:47\",\"NetworkMessageId\":\"7250ff78-fd13-45a2-bb5d-23a5d59c2699\",\"OriginalDeliveryLocation\":\"Quarantine\",\"P1Sender\":\"prvs=0000000000=human@sender.com\",\"P2Sender\":\"human@sender.com\",\"Policy\":\"SafeAttachements\",\"PolicyAction\":\"Quarantine\",\"Recipients\":[\"human@example.com\"],\"SenderIp\":\"1.2.3.4\",\"Subject\":\"Refund to you\",\"SystemOverrides\":[{\"Details\":\"Antimalware policy block by file type\",\"FinalOverride\":\"No\",\"Result\":\"Block\",\"Source\":\"Tenant\"}],\"ThreatsAndDetectionTech\":[\"Malware: [File detonation]\",\"Spam: [General filter]\"],\"Verdict\":\"Malware\"}\n",
"event": {
"action": "Blocked",
"kind": "event",
"code": "28",
"url": "https://protection.office.com/?hash=/threatexplorer?messageParams=a4dbf74a-89e0-40de-b14d-df573f48aa45,a4dbf74a-89e0-40de-b14d-df573f48aa45-0000000000000000000-1,2022-07-08T00:00:00,2022-07-08T23:59:59&view=Malware"
},
"@timestamp": "2022-07-08T09:10:19",
"service": {
"name": "ThreatIntelligence"
},
"user": {
"name": "ThreatIntel",
"id": "ThreatIntel"
},
"organization": {
"id": "8a457951-a594-4607-a5dc-dfc72338eb13"
},
"action": {
"id": 28,
"name": "Blocked",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 28,
"user_type": {
"code": 4,
"name": "System"
},
"audit": {
"object_id": "4ca2df96-4488-4f3b-a265-b4edaa3c4d8f"
},
"defender": {
"email": {
"verdict": {
"reason": "Malware"
},
"delivery": {
"action": "Blocked",
"original_location": "Quarantine",
"latest_location": "Quarantine"
},
"attachments": [
{
"name": "Trojan_Gen_FileWithSpoofedExtension_A",
"verdict": {
"code": "1",
"name": "bad"
}
}
]
},
"detection": {
"type": "Inline",
"method": "File detonation",
"technology": [
"Malware: [File detonation]",
"Spam: [General filter]"
]
},
"additional_actions": [
"OriginalDelivery: [N/A]"
],
"auth_details": [
{
"Name": "SPF",
"Value": "Pass"
},
{
"Name": "DKIM",
"Value": "Fail"
},
{
"Name": "DMARC",
"Value": "Best guess pass"
},
{
"Name": "Comp Auth",
"Value": "pass"
}
],
"system_overrides": [
{
"Details": "Antimalware policy block by file type",
"FinalOverride": "No",
"Result": "Block",
"Source": "Tenant"
}
]
}
},
"email": {
"local_id": "7250ff78-fd13-45a2-bb5d-23a5d59c2699",
"subject": "Refund to you",
"delivery_timestamp": "2022-07-08T09:07:47",
"message_id": "4cc4a74e-a195-4222-abd7-a8adf2cd347d@sender.com",
"reply_to": {
"address": [
"prvs=0000000000=human@sender.com"
]
},
"from": {
"address": [
"human@sender.com"
]
},
"to": {
"address": [
"human@example.com"
]
},
"attachments": [
{
"file": {
"name": "malicious.pdf.exe",
"mime_type": "exe;zip",
"hash": {
"sha256": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855"
}
}
}
]
},
"source": {
"ip": "1.2.3.4",
"address": "1.2.3.4"
},
"related": {
"ip": [
"1.2.3.4"
],
"user": [
"ThreatIntel"
]
}
}
{
"message": "{\"CreationTime\":\"2022-07-07T10:10:52\",\"Id\":\"47bf7844-15bf-4cf2-91a3-15b32ceb89b5\",\"Operation\":\"TIUrlClickData\",\"OrganizationId\":\"0eaa2260-b241-410b-bcae-e38c8b68787f\",\"RecordType\":41,\"UserKey\":\"ThreatIntel\",\"UserType\":4,\"Version\":1,\"Workload\":\"ThreatIntelligence\",\"UserId\":\"human@example.org\",\"AppName\":\"Mail\",\"AppVersion\":\"0.0.0000\",\"EventDeepLink\":\"https://protection.office.com/threatexplorer?dltarget=Explorer&dlstorage=Url&viewid=Phish&query-Recipients=people@xample.org&query-NetworkMessageId=53b5da37-1893-4e78-a89f-a4d26b53184c\",\"SourceId\":\"8a8634d0-d803-4bc9-b221-2863bff6a001\",\"TimeOfClick\":\"2022-07-07T09:33:33\",\"Url\":\"https://malicious.domain.com\",\"UserIp\":\"1.2.3.4\"}\n",
"event": {
"action": "TIUrlClickData",
"kind": "event",
"code": "41",
"url": "https://protection.office.com/threatexplorer?dltarget=Explorer&dlstorage=Url&viewid=Phish&query-Recipients=people@xample.org&query-NetworkMessageId=53b5da37-1893-4e78-a89f-a4d26b53184c"
},
"@timestamp": "2022-07-07T10:10:52",
"service": {
"name": "ThreatIntelligence"
},
"user": {
"name": "human@example.org",
"id": "ThreatIntel",
"email": "human@example.org"
},
"organization": {
"id": "0eaa2260-b241-410b-bcae-e38c8b68787f"
},
"action": {
"id": 41,
"name": "TIUrlClickData",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 41,
"user_type": {
"code": 4,
"name": "System"
}
},
"related": {
"user": [
"human@example.org"
]
}
}
{
"message": "{\"CreationTime\":\"2022-04-05T19:51:35\",\"Id\":\"1324e3d2-f29c-5c15-9f44-1ca64e42250f\",\"Operation\":\"MessageCreatedHasLink\",\"OrganizationId\":\"34314e6e-4023-4e4b-a15e-143f63244e2b\",\"RecordType\":25,\"UserKey\":\"11dbae04-5d5d-4bc7-9766-16793ed91233\",\"UserType\":0,\"Version\":1,\"Workload\":\"MicrosoftTeams\",\"ClientIP\":\"::ffff:1.2.3.4\",\"UserId\":\"email@example.org\",\"ChatThreadId\":\"19:11dbae04-5d5d-4bc7-9766-16793ed91233_4fdb1e07-a7e9-475c-a5e2-8d042a6c8102@unq.gbl.spaces\",\"CommunicationType\":\"OneOnOne\",\"ExtraProperties\":[{\"Key\":\"TimeZone\",\"Value\":\"Europe/Paris\"},{\"Key\":\"OsName\",\"Value\":\"windows\"},{\"Key\":\"OsVersion\",\"Value\":\"10\"},{\"Key\":\"Country\",\"Value\":\"fr\"},{\"Key\":\"ClientName\",\"Value\":\"skypeteams\"},{\"Key\":\"ClientVersion\",\"Value\":\"27/1.0.0.2022031814\"},{\"Key\":\"ClientUtcOffsetSeconds\",\"Value\":\"7200\"}],\"MessageId\":\"1649188295480\",\"MessageVersion\":\"1649188295480\",\"ItemName\":\"19:11dbae04-5d5d-4bc7-9766-16793ed91233_4fdb1e07-a7e9-475c-a5e2-8d042a6c8102@unq.gbl.spaces\",\"MessageURLs\":[\"https://www.amazon.fr/s?i=merchant-items&me=A1TLEYKQIC7812&marketplaceID=A13V1IB3VIYZZH&qid=1649187214&ref=sr_pg_1\"],\"Members\": [{\"UPN\": \"admin@example.org\", \"Role\": 1}, {\"UPN\": \"user1@example.org\", \"Role\": 0}]}",
"event": {
"action": "MessageCreatedHasLink",
"kind": "event",
"code": "25",
"category": [
"network"
],
"type": [
"info"
]
},
"@timestamp": "2022-04-05T19:51:35",
"service": {
"name": "MicrosoftTeams"
},
"user": {
"name": "email@example.org",
"id": "11dbae04-5d5d-4bc7-9766-16793ed91233",
"email": "email@example.org"
},
"organization": {
"id": "34314e6e-4023-4e4b-a15e-143f63244e2b"
},
"action": {
"id": 25,
"name": "MessageCreatedHasLink",
"target": "network-traffic",
"outcome": "success"
},
"source": {
"ip": "1.2.3.4",
"address": "1.2.3.4"
},
"office365": {
"record_type": 25,
"user_type": {
"code": 0,
"name": "Regular"
},
"teams": {
"communication": {
"type": "OneOnOne"
},
"message": {
"id": "1649188295480",
"version": "1649188295480",
"urls": [
"https://www.amazon.fr/s?i=merchant-items&me=A1TLEYKQIC7812&marketplaceID=A13V1IB3VIYZZH&qid=1649187214&ref=sr_pg_1"
]
},
"team": {
"members": [
{
"id": "admin@example.org",
"role": "Owner"
},
{
"id": "user1@example.org",
"role": "Member"
}
]
}
}
},
"related": {
"ip": [
"1.2.3.4"
],
"user": [
"email@example.org"
]
}
}
{
"message": "{\"CreationTime\": \"2019-11-18T13:40:24\", \"Id\": \"038ae875-ffd8-45e4-9dcf-6e385cfad349\", \"Operation\": \"Update group.\", \"OrganizationId\": \"3e49b082-62d5-4849-a5b0-86ed519287d2\", \"RecordType\": 8, \"ResultStatus\": \"Success\", \"UserKey\": \"10030000A96EA230@acme.onmicrosoft.com\", \"UserType\": 0, \"Version\": 1, \"Workload\": \"AzureActiveDirectory\", \"ClientIP\": \"<null>\", \"ObjectId\": \"Not Available\", \"UserId\": \"Sync_V-WATT_83d3b7098669@acme.onmicrosoft.com\", \"AzureActiveDirectoryEventType\": 1, \"ExtendedProperties\": [{\"Name\": \"resultType\", \"Value\": \"Success\"}]}",
"event": {
"action": "Update group.",
"kind": "event",
"code": "8",
"category": [
"iam"
],
"type": [
"change"
]
},
"@timestamp": "2019-11-18T13:40:24",
"service": {
"name": "AzureActiveDirectory"
},
"user": {
"name": "Sync_V-WATT_83d3b7098669@acme.onmicrosoft.com",
"id": "10030000A96EA230@acme.onmicrosoft.com",
"email": "Sync_V-WATT_83d3b7098669@acme.onmicrosoft.com"
},
"organization": {
"id": "3e49b082-62d5-4849-a5b0-86ed519287d2"
},
"action": {
"id": 8,
"name": "Update group.",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 8,
"result_status": "Success",
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "Not Available"
}
},
"related": {
"user": [
"Sync_V-WATT_83d3b7098669@acme.onmicrosoft.com"
]
}
}
{
"message": "{\"CreationTime\": \"2019-12-09T14:18:19\", \"Id\": \"359154c4-72c5-4ba0-bbf9-7eb1dff88af7\", \"Operation\": \"Update user.\", \"OrganizationId\": \"3e49b082-62d5-4849-a5b0-86ed519287d2\", \"RecordType\": 8, \"ResultStatus\": \"Success\", \"UserKey\": \"10030000A96EA230@acme.onmicrosoft.com\", \"UserType\": 0, \"Version\": 1, \"Workload\": \"AzureActiveDirectory\", \"ClientIP\": \"<null>\", \"ObjectId\": \"bob.smith@acme.org\", \"UserId\": \"Sync_V-WATT_83d3b7098669@acme.onmicrosoft.com\", \"AzureActiveDirectoryEventType\": 1, \"ExtendedProperties\": [{\"Name\": \"resultType\", \"Value\": \"Success\"}, {\"Name\": \"auditEventCategory\", \"Value\": \"UserManagement\"}, {\"Name\": \"nCloud\", \"Value\": \"<null>\"}]}",
"event": {
"action": "Update user.",
"kind": "event",
"code": "8",
"category": [
"iam"
],
"type": [
"change"
]
},
"@timestamp": "2019-12-09T14:18:19",
"service": {
"name": "AzureActiveDirectory"
},
"user": {
"name": "Sync_V-WATT_83d3b7098669@acme.onmicrosoft.com",
"id": "10030000A96EA230@acme.onmicrosoft.com",
"email": "Sync_V-WATT_83d3b7098669@acme.onmicrosoft.com"
},
"organization": {
"id": "3e49b082-62d5-4849-a5b0-86ed519287d2"
},
"action": {
"id": 8,
"name": "Update user.",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 8,
"result_status": "Success",
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "bob.smith@acme.org"
}
},
"related": {
"user": [
"Sync_V-WATT_83d3b7098669@acme.onmicrosoft.com"
]
}
}
{
"message": "{\"CreationTime\":\"2021-03-05T14:43:17\",\"Id\":\"21a107c2-2071-4ce3-8330-cf82f3caa79f\",\"Operation\":\"Update user.\",\"OrganizationId\":\"3e49b082-62d5-4849-a5b0-86ed519287d2\",\"RecordType\":8,\"ResultStatus\":\"Success\",\"UserKey\":\"10030000A96EA230@domain.onmicrosoft.com\",\"UserType\":0,\"Version\":1,\"Workload\":\"AzureActiveDirectory\",\"ClientIP\":\"\",\"ObjectId\":\"aaaa.bbbb@example.org\",\"UserId\":\"user@domain.onmicrosoft.com\",\"AzureActiveDirectoryEventType\":1,\"ExtendedProperties\":[{\"Name\":\"additionalDetails\",\"Value\":\"{\\\"UserType\\\":\\\"Member\\\"}\"},{\"Name\":\"extendedAuditEventCategory\",\"Value\":\"User\"}],\"ModifiedProperties\":[{\"Name\":\"LastDirSyncTime\",\"NewValue\":\"[\\r\\n \\\"2021-03-05T14:43:17Z\\\"\\r\\n]\",\"OldValue\":\"[\\r\\n \\\"2021-03-03T12:30:50Z\\\"\\r\\n]\"},{\"Name\":\"Included Updated Properties\",\"NewValue\":\"LastDirSyncTime\",\"OldValue\":\"\"},{\"Name\":\"Action Client Name\",\"NewValue\":\"DirectorySync\",\"OldValue\":\"\"},{\"Name\":\"TargetId.UserType\",\"NewValue\":\"Member\",\"OldValue\":\"\"}],\"Actor\":[{\"ID\":\"user@domain.onmicrosoft.com\",\"Type\":5},{\"ID\":\"10030000A96EA230\",\"Type\":3},{\"ID\":\"User_c96cf894-cca6-438b-b6f2-c2744c1680f5\",\"Type\":2},{\"ID\":\"c96cf894-cca6-438b-b6f2-c2744c1680f5\",\"Type\":2},{\"ID\":\"User\",\"Type\":2}],\"ActorContextId\":\"3e49b082-62d5-4849-a5b0-86ed519287d2\",\"ActorIpAddress\":\"\",\"InterSystemsId\":\"92d46438-1e67-43e3-91ca-039ff39d7217\",\"IntraSystemId\":\"bd8cc421-efe8-4a44-b61d-44670fc6f56e\",\"SupportTicketId\":\"\",\"Target\":[{\"ID\":\"User_de76d2a9-d8bf-47d4-8f74-2ba2b560f55e\",\"Type\":2},{\"ID\":\"de76d2a9-d8bf-47d4-8f74-2ba2b560f55e\",\"Type\":2},{\"ID\":\"User\",\"Type\":2},{\"ID\":\"aaaa.bbbb@example.org\",\"Type\":5},{\"ID\":\"1003200119762B26\",\"Type\":3}],\"TargetContextId\":\"3e49b082-62d5-4849-a5b0-86ed519287d2\"}",
"event": {
"action": "Update user.",
"kind": "event",
"code": "8",
"category": [
"iam"
],
"type": [
"change"
]
},
"@timestamp": "2021-03-05T14:43:17",
"service": {
"name": "AzureActiveDirectory"
},
"user": {
"name": "user@domain.onmicrosoft.com",
"id": "10030000A96EA230@domain.onmicrosoft.com",
"email": "user@domain.onmicrosoft.com"
},
"organization": {
"id": "3e49b082-62d5-4849-a5b0-86ed519287d2"
},
"action": {
"id": 8,
"name": "Update user.",
"target": "user",
"outcome": "success"
},
"office365": {
"record_type": 8,
"result_status": "Success",
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "aaaa.bbbb@example.org"
}
},
"related": {
"user": [
"user@domain.onmicrosoft.com"
]
}
}
{
"message": "{\"CreationTime\": \"2019-11-18T10:15:52\", \"Id\": \"405f795f-8bff-45d2-98c9-ef675d7d2db6\", \"Operation\": \"UserLoggedIn\", \"OrganizationId\": \"3e49b082-62d5-4849-a5b0-86ed519287d2\", \"RecordType\": 15, \"ResultStatus\": \"Succeeded\", \"UserKey\": \"10037FFEA0A22006@company.onmicrosoft.com\", \"UserType\": 0, \"Version\": 1, \"Workload\": \"AzureActiveDirectory\", \"ClientIP\": \"1.2.3.4:8085\", \"ObjectId\": \"5f09333a-842c-47da-a157-57da27fcbca5\", \"UserId\": \"REDACTED@company.onmicrosoft.com\", \"AzureActiveDirectoryEventType\": 1, \"ExtendedProperties\": [{\"Name\": \"UserAgent\", \"Value\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/18.17763\"}, {\"Name\": \"UserAuthenticationMethod\", \"Value\": \"1\"}, {\"Name\": \"RequestType\", \"Value\": \"OAuth2:Authorize\"}, {\"Name\": \"ResultStatusDetail\", \"Value\": \"Redirect\"}, {\"Name\": \"KeepMeSignedIn\", \"Value\": \"True\"}], \"ModifiedProperties\": [], \"Actor\": [{\"ID\": \"3d0e7ff9-261e-440f-a2f8-9e1ec4072f3e\", \"Type\": 0}, {\"ID\": \"REDACTED@company.onmicrosoft.com\", \"Type\": 5}, {\"ID\": \"10037FFEA0A22006\", \"Type\": 3}], \"ActorContextId\": \"3e49b082-62d5-4849-a5b0-86ed519287d2\", \"ActorIpAddress\": \"1.2.3.4\", \"InterSystemsId\": \"794c9504-66fe-441c-831a-5fc2badfcdc8\", \"IntraSystemId\": \"99f54f6a-ddfe-4916-b89b-edd9fcac4500\", \"SupportTicketId\": \"\", \"Target\": [{\"ID\": \"5f09333a-842c-47da-a157-57da27fcbca5\", \"Type\": 0}], \"TargetContextId\": \"3e49b082-62d5-4849-a5b0-86ed519287d2\", \"ApplicationId\": \"89bee1f7-5e6e-4d8a-9f3d-ecd601259da7\"}",
"event": {
"action": "UserLoggedIn",
"kind": "event",
"code": "15",
"category": [
"authentication"
],
"type": [
"start"
]
},
"@timestamp": "2019-11-18T10:15:52",
"service": {
"name": "AzureActiveDirectory"
},
"user": {
"name": "REDACTED@company.onmicrosoft.com",
"id": "10037FFEA0A22006@company.onmicrosoft.com",
"email": "REDACTED@company.onmicrosoft.com"
},
"organization": {
"id": "3e49b082-62d5-4849-a5b0-86ed519287d2"
},
"action": {
"id": 15,
"name": "UserLoggedIn",
"target": "network-traffic",
"outcome": "success"
},
"source": {
"ip": "1.2.3.4",
"port": 8085,
"address": "1.2.3.4"
},
"office365": {
"record_type": 15,
"result_status": "Succeeded",
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "5f09333a-842c-47da-a157-57da27fcbca5"
},
"auth": {
"user_authentication_method": 1,
"request_type": "OAuth2:Authorize",
"result_status_detail": "Redirect",
"keep_me_signed_in": true
}
},
"user_agent": {
"original": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/18.17763",
"device": {
"name": "Other"
},
"name": "Edge",
"version": "18.17763",
"os": {
"name": "Windows",
"version": "10"
}
},
"related": {
"ip": [
"1.2.3.4"
],
"user": [
"REDACTED@company.onmicrosoft.com"
]
}
}
{
"message": "{\"CreationTime\":\"2022-10-14T13:48:03\",\"Id\":\"4af0b443-42dd-4dc6-9bd1-751a55441000\",\"Operation\":\"UserLoginFailed\",\"OrganizationId\":\"aa09a079-7796-46a8-a4d4-4d21b0dcf1b2\",\"RecordType\":15,\"ResultStatus\":\"Success\",\"UserKey\":\"785d81fb-82aa-4ff3-9cbc-e3280761f36a\",\"UserType\":0,\"Version\":1,\"Workload\":\"AzureActiveDirectory\",\"ClientIP\":\"20.250.8.183\",\"ObjectId\":\"00000003-0000-0ff1-ce00-000000000000\",\"UserId\":\"user@mycompany.com\",\"AzureActiveDirectoryEventType\":1,\"ExtendedProperties\":[{\"Name\":\"ResultStatusDetail\",\"Value\":\"Success\"},{\"Name\":\"UserAgent\",\"Value\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0\"},{\"Name\":\"UserAuthenticationMethod\",\"Value\":\"1\"},{\"Name\":\"RequestType\",\"Value\":\"SAS:EndAuth\"}],\"ModifiedProperties\":[],\"Actor\":[{\"ID\":\"785d81fb-82aa-4ff3-9cbc-e3280761f36a\",\"Type\":0},{\"ID\":\"user@mycompany.com\",\"Type\":5}],\"ActorContextId\":\"aa09a079-7796-46a8-a4d4-4d21b0dcf1b2\",\"ActorIpAddress\":\"20.250.8.183\",\"InterSystemsId\":\"d48e6ea0-40c1-5000-5eba-0ee33d13b1ca\",\"IntraSystemId\":\"4af0b443-42dd-4dc6-9bd1-751a55441000\",\"SupportTicketId\":\"\",\"Target\":[{\"ID\":\"00000003-0000-0ff1-ce00-000000000000\",\"Type\":0}],\"TargetContextId\":\"aa09a079-7796-46a8-a4d4-4d21b0dcf1b2\",\"ApplicationId\":\"00000003-0000-0ff1-ce00-000000000000\",\"DeviceProperties\":[{\"Name\":\"OS\",\"Value\":\"Windows 10\"},{\"Name\":\"BrowserType\",\"Value\":\"Firefox\"},{\"Name\":\"IsCompliantAndManaged\",\"Value\":\"False\"},{\"Name\":\"SessionId\",\"Value\":\"b3a9b2b4-57c9-406b-9a2d-106b7f612248\"}],\"ErrorNumber\":\"500121\",\"LogonError\":\"AuthenticationFailedSasError\"}",
"event": {
"action": "UserLoginFailed",
"kind": "event",
"code": "15",
"category": [
"iam"
],
"type": [
"info"
]
},
"@timestamp": "2022-10-14T13:48:03",
"service": {
"name": "AzureActiveDirectory"
},
"user": {
"name": "user@mycompany.com",
"id": "785d81fb-82aa-4ff3-9cbc-e3280761f36a",
"email": "user@mycompany.com"
},
"organization": {
"id": "aa09a079-7796-46a8-a4d4-4d21b0dcf1b2"
},
"action": {
"id": 15,
"name": "UserLoginFailed",
"target": "network-traffic",
"outcome": "success"
},
"source": {
"ip": "20.250.8.183",
"address": "20.250.8.183"
},
"office365": {
"record_type": 15,
"result_status": "Success",
"user_type": {
"code": 0,
"name": "Regular"
},
"audit": {
"object_id": "00000003-0000-0ff1-ce00-000000000000"
},
"logon_error": "AuthenticationFailedSasError",
"error_number": 500121,
"auth": {
"user_authentication_method": 1,
"request_type": "SAS:EndAuth",
"result_status_detail": "Success"
}
},
"user_agent": {
"original": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0",
"device": {
"name": "Other"
},
"name": "Firefox",
"version": "105.0",
"os": {
"name": "Windows",
"version": "10"
}
},
"related": {
"ip": [
"20.250.8.183"
],
"user": [
"user@mycompany.com"
]
}
}
Extracted Fields
The following table lists the fields that are extracted, normalized under the ECS format, analyzed and indexed by the parser. It should be noted that infered fields are not listed.
Name | Type | Description |
---|---|---|
@timestamp |
date |
Date/time when the event originated. |
action.properties |
object |
A list of objects describing the action |
action.target |
keyword |
The target of the action |
email.attachments |
array |
A list of objects describing the attachment files sent along with an email message |
email.delivery_timestamp |
date |
The date and time when the email message was received by the service or client |
email.from.address |
keyword |
The email address of the sender, typically from the RFC 5322 From: header field |
email.local_id |
keyword |
Unique identifier given to the email by the source that created the event |
email.message_id |
keyword |
Identifier from the RFC 5322 Message-ID: email header that refers to a particular email message |
email.reply_to.address |
keyword |
The address that replies should be delivered to based on the value in the RFC 5322 Reply-To: header |
email.subject |
keyword |
A brief summary of the topic of the message |
email.to.address |
keyword |
The email address of recipient |
event.action |
keyword |
The action captured by the event. |
event.category |
keyword |
Event category. The second categorization field in the hierarchy. |
event.code |
keyword |
Identification code for this event. |
event.end |
date |
event.end contains the date when the event ended or when the activity was last observed. |
event.kind |
keyword |
The kind of the event. The highest categorization field in the hierarchy. |
event.reason |
keyword |
Reason why this event happened, according to the source |
event.start |
date |
event.start contains the date when the event started or when the activity was first observed. |
event.type |
keyword |
Event type. The third categorization field in the hierarchy. |
event.url |
keyword |
Event investigation URL |
file.directory |
keyword |
Directory where the file is located. |
file.name |
keyword |
Name of the file including the extension, without the directory. |
host.name |
keyword |
Name of the host. |
log.level |
keyword |
Log level of the log event. |
office365.audit.object_id |
keyword |
For Exchange admin audit logging, the name of the object that was modified by the cmdlet. For SharePoint activity, the full URL path name of the file or folder accessed by a user. For Azure AD activity, the name of the user account that was modified. |
office365.auth.keep_me_signed_in |
boolean |
User KeepMeSignedIn choice |
office365.auth.request_type |
keyword |
Authentifcation type |
office365.auth.result_status_detail |
keyword |
Authentication result detail |
office365.auth.user_authentication_method |
long |
User authentication method |
office365.context.aad_session_id |
keyword |
The identifier of an Azure Active Directory session |
office365.context.api_id |
keyword |
The identifier of the API pathway |
office365.context.client.id |
keyword |
The identifier of Azure Active Directory application |
office365.context.client.name |
keyword |
The name of Azure Active Directory application |
office365.context.correlation.id |
keyword |
The identifier to correlate user's action across Microsoft 365 services |
office365.defender.additional_actions |
array |
The additional actions taken on the email |
office365.defender.auth_details |
array |
The authentication checks that are done for the email |
office365.defender.connectors |
keyword |
Identifiers of connectors associated with the email |
office365.defender.detection.method |
keyword |
The method or the technology used for the detection |
office365.defender.detection.technology |
keyword |
The threats and technologies applied on the email |
office365.defender.detection.type |
keyword |
The type of detection |
office365.defender.email.attachments |
array |
The attachements of the email |
office365.defender.email.delivery.action |
keyword |
The original action delivery on the email |
office365.defender.email.delivery.latest_location |
keyword |
The latest location delivery of the email |
office365.defender.email.delivery.original_location |
keyword |
The original location delivery of the email |
office365.defender.email.verdict.confidence |
keyword |
The confidence in the verdict |
office365.defender.email.verdict.reason |
keyword |
The verdict about the messahe |
office365.defender.system_overrides |
array |
Overrides that are applicable to the email |
office365.error_number |
long |
Error number |
office365.investigation.alert.category |
keyword |
Investigation alert category |
office365.investigation.alert.correlation_key |
keyword |
Investigation alert correlation key |
office365.investigation.alert.is_incident |
boolean |
Investigation alert severity |
office365.investigation.alert.provider.name |
keyword |
Investigation alert provider name |
office365.investigation.alert.provider.status |
keyword |
Investigation alert provider status |
office365.investigation.alert.severity |
keyword |
Investigation alert severity |
office365.investigation.alert.source_type |
keyword |
Investigation alert source type |
office365.investigation.alert.type |
keyword |
Investigation alert type |
office365.investigation.email.sender.domains |
keyword |
The domain of the sender. Might be an array |
office365.investigation.email.sender.ip |
array |
Email sender IP`s |
office365.investigation.email.subjects |
array |
A list of email subjects |
office365.investigation.email.urls |
array |
Email urls |
office365.investigation.id |
keyword |
Investigation id |
office365.investigation.name |
keyword |
Investigation name |
office365.investigation.status |
keyword |
Investigation status |
office365.investigation.threats |
array |
A list of threats |
office365.investigation.type |
keyword |
Investigation type |
office365.logon_error |
keyword |
Logon error detailed reason |
office365.record_type |
long |
The type of the operation |
office365.result_status |
keyword |
Indicates whether the action was successful or not |
office365.scope.code |
long |
The origin (saas or on-premise) of the event |
office365.teams.action |
keyword |
The action taken by an invitee or the channel owner |
office365.teams.channel.id |
keyword |
The identifier of the channel |
office365.teams.channel.name |
keyword |
The name of the channel |
office365.teams.channel.type |
keyword |
The type of the channel |
office365.teams.communication.type |
keyword |
The type of communication |
office365.teams.invitee |
keyword |
The identifier of an invitee |
office365.teams.message.id |
keyword |
The identifier of the message |
office365.teams.message.size |
long |
The size of the message in bytes with UTF-16 encoding |
office365.teams.message.urls |
keyword |
A list of urls present in the message |
office365.teams.message.version |
keyword |
The version of the message |
office365.teams.team.id |
keyword |
The identifier of the team |
office365.teams.team.members |
object |
The list of users in a team |
office365.teams.team.name |
keyword |
The name of the team |
office365.user_type.code |
long |
The type of user that performed the operation |
office365.virus_info |
keyword |
VirusInfo |
office365.virus_vendor |
keyword |
VirusVendor |
organization.id |
keyword |
Unique identifier for the organization. |
rule.category |
keyword |
Rule category |
rule.name |
keyword |
Rule name |
service.name |
keyword |
Name of the service. |
source.ip |
ip |
IP address of the source. |
source.port |
long |
Port of the source. |
url.full |
wildcard |
Full unparsed URL. |
url.original |
wildcard |
Unmodified original url as seen in the event source. |
user.email |
keyword |
User email address. |
user.id |
keyword |
Unique identifier of the user. |
user.name |
keyword |
Short name or login of the user. |
user_agent.original |
keyword |
Unparsed user_agent string. |