Skip to content

Fortinet Fortimail

Overview

Fortinet cybersecurity solutions sells physical products such as firewalls, plus software and services such as anti-virus protection, intrusion prevention systems and endpoint security components.

The following Sekoia.io built-in rules match the intake Fortinet FortiMail. This documentation is updated automatically and is based solely on the fields used by the intake which are checked against our rules. This means that some rules will be listed but might not be relevant with the intake.

SEKOIA.IO x Fortinet FortiMail on ATT&CK Navigator

Burp Suite Tool Detected

Burp Suite is a cybersecurity tool. When used as a proxy service, its purpose is to intercept packets and modify them to send them to the server. Burp Collaborator is a network service that Burp Suite uses to help discover many kinds of vulnerabilities (vulnerabilities scanner).

  • Effort: intermediate
Download Files From Non-Legitimate TLDs

Detects file downloads from non-legitimate TLDs. Additional legitimates TLDs should be filtered according to the business habits.

  • Effort: master
Potential DNS Tunnel

Detects domain name which is longer than 95 characters. Long domain names are distinctive of DNS tunnels.

  • Effort: advanced
RTLO Character

Detects RTLO (Right-To-Left character) in file and process names.

  • Effort: elementary
SEKOIA.IO Intelligence Feed

Detect threats based on indicators of compromise (IOCs) collected by SEKOIA's Threat and Detection Research team.

  • Effort: elementary
Suspicious Email Attachment Received

Detects email containing an .exe|.dll|.ps1|.bat|.hta attachment. Most of the time files send by mail like this are malware.

  • Effort: elementary
Telegram Bot API Request

Detects suspicious DNS queries to api.telegram.org used by Telegram Bots of any kind

  • Effort: advanced
WCE wceaux.dll Creation

Detects wceaux.dll creation while Windows Credentials Editor (WCE) is executed.

  • Effort: intermediate

Event Categories

The following table lists the data source offered by this integration.

Data Source Description
Email gateway date_source: "Fortinet email security solution"

Event Samples

Find below few samples of events and how they are normalized by Sekoia.io.

{
    "message": "time=10:45:27 device_id=123 log_id=000000 type=encrypt pri=information session_id=\"ziuhiohzf\" msg=\"User user1@1.ca read secure message, id:'ziuhiohzf', sent from: 'user2@2.ca', subject: 'ppt file'\"",
    "event": {
        "kind": "encrypt",
        "message": "User user1@1.ca read secure message, id:'ziuhiohzf', sent from: 'user2@2.ca', subject: 'ppt file'"
    },
    "action": {
        "outcome_reason": "User user1@1.ca read secure message, id:'ziuhiohzf', sent from: 'user2@2.ca', subject: 'ppt file'",
        "properties": {
            "device_id": "123",
            "log_id": "000000",
            "session_id": "ziuhiohzf"
        }
    },
    "host": {
        "name": "abc"
    },
    "log": {
        "hostname": "abc",
        "level": "information"
    }
}
{
    "message": "to=<jdoe@example.com> delay=00:00:06 xdelay=00:00:06 mailer=esmtp pri=165917 relay= [3.4.5.6] dsn=2.0.0 stat=Sent (Ok: queued as 4T9pxY2qZtz2XPBPX)",
    "action": {
        "properties": {
            "mailer": "esmtp"
        }
    },
    "email": {
        "to": {
            "address": [
                "jdoe@example.com"
            ]
        }
    },
    "log": {
        "level": "165917"
    },
    "related": {
        "ip": [
            "3.4.5.6"
        ]
    },
    "source": {
        "address": "3.4.5.6",
        "ip": "3.4.5.6"
    }
}
{
    "message": "time=17:07:46.124 device_id=FEVM020000087260 log_id=00000 type=event subtype=smtp pri=information  user=mail ui=mail action=NONE status=N/A session_id=\"1Z11R1T1\" msg=\"from=person.fr, size=26135, class=0, nrcpts=1, msgid=something.com, proto=ESMTP, daemon=SMTP_MTA, relay=notifications [1.1.1.1]\"",
    "event": {
        "action": "NONE",
        "category": "smtp",
        "kind": "event",
        "message": "from=person.fr, size=26135, class=0, nrcpts=1, msgid=something.com, proto=ESMTP, daemon=SMTP_MTA, relay=notifications [1.1.1.1]"
    },
    "action": {
        "outcome_reason": "from=person.fr, size=26135, class=0, nrcpts=1, msgid=something.com, proto=ESMTP, daemon=SMTP_MTA, relay=notifications [1.1.1.1]",
        "properties": {
            "class": "0",
            "daemon": "SMTP_MTA",
            "device_id": "FEVM020000087260",
            "log_id": "00000",
            "message_id": "something.com",
            "nrcpts": "1",
            "relay": "notifications",
            "session_id": "1Z11R1T1",
            "user_identifier": "mail"
        }
    },
    "email": {
        "from": {
            "address": [
                "person.fr"
            ]
        }
    },
    "file": {
        "size": 26135
    },
    "host": {
        "name": "hostname"
    },
    "log": {
        "hostname": "hostname",
        "level": "information"
    },
    "network": {
        "protocol": "ESMTP"
    },
    "related": {
        "user": [
            "mail"
        ]
    },
    "user": {
        "name": "mail"
    }
}
{
    "message": "time=18:33:36.601 device_id=123456 log_id=0003007110 type=event subtype=smtp pri=information  user=mail ui=mail action=NONE status=N/A session_id=\"12345\" msg=\"STARTTLS=server, relay=something.com [1.1.1.1], version=TLSv1.2, verify=NO, cipher=ECDHE-RSA-something, bits=256/256\"",
    "event": {
        "action": "NONE",
        "category": "smtp",
        "kind": "event",
        "message": "STARTTLS=server, relay=something.com [1.1.1.1], version=TLSv1.2, verify=NO, cipher=ECDHE-RSA-something, bits=256/256"
    },
    "action": {
        "outcome_reason": "STARTTLS=server, relay=something.com [1.1.1.1], version=TLSv1.2, verify=NO, cipher=ECDHE-RSA-something, bits=256/256",
        "properties": {
            "bits_sent_ratio": "256/256",
            "device_id": "123456",
            "log_id": "0003007110",
            "relay": "something.com",
            "session_id": "12345",
            "start_tls": "server",
            "user_identifier": "mail",
            "verify": "NO"
        }
    },
    "host": {
        "name": "123"
    },
    "log": {
        "hostname": "123",
        "level": "information"
    },
    "related": {
        "user": [
            "mail"
        ]
    },
    "tls": {
        "cipher": "ECDHE-RSA-something"
    },
    "user": {
        "name": "mail"
    }
}
{
    "message": "time=18:33:35.615 device_id=xcvfg log_id=0003007072 type=event subtype=smtp pri=information  user=mail ui=mail action=NONE status=N/A session_id=\"13KGXMHI007058-13KGXMHK007058\" msg=\"to=<mh.fr>, delay=00:00:13, xdelay=00:00:12, mailer=esmtp, pri=50733, relay=email.fr. [1.1.1.1], dsn=2.0.0, stat=Sent (Ok: queued as C41457FCE6)\"",
    "event": {
        "action": "NONE",
        "category": "smtp",
        "kind": "event",
        "message": "to=<mh.fr>, delay=00:00:13, xdelay=00:00:12, mailer=esmtp, pri=50733, relay=email.fr. [1.1.1.1], dsn=2.0.0, stat=Sent (Ok: queued as C41457FCE6)",
        "reason": "Sent (Ok: queued as C41457FCE6)"
    },
    "action": {
        "outcome_reason": "to=<mh.fr>, delay=00:00:13, xdelay=00:00:12, mailer=esmtp, pri=50733, relay=email.fr. [1.1.1.1], dsn=2.0.0, stat=Sent (Ok: queued as C41457FCE6)",
        "properties": {
            "delay": "00:00:13",
            "device_id": "xcvfg",
            "dsn_version": "2.0.0",
            "log_id": "0003007072",
            "mailer": "esmtp",
            "priority_level_msg": "50733",
            "session_id": "13KGXMHI007058-13KGXMHK007058",
            "user_identifier": "mail",
            "xdelay": "00:00:12"
        }
    },
    "destination": {
        "address": "email.fr.",
        "domain": "email.fr.",
        "ip": "1.1.1.1",
        "size_in_char": 9
    },
    "host": {
        "name": "1234"
    },
    "log": {
        "hostname": "1234",
        "level": "information"
    },
    "related": {
        "hosts": [
            "email.fr."
        ],
        "ip": [
            "1.1.1.1"
        ],
        "user": [
            "mail"
        ]
    },
    "user": {
        "email": "<mh.fr>",
        "name": "mail"
    }
}
{
    "message": "time=15:12:29.013 device_id=FEVM020000087260 log_id=0003014581 type=event subtype=smtp pri=information  user=mail ui=mail action=NONE status=N/A session_id=\"13RDCREi014579-13RDCREj014579\" msg=\"to=<sjira.eu>, delay=00:00:02, xdelay=00:00:01, mailer=esmtp, pri=40733, relay=mail.eu. [1.1.1.1], dsn=2.0.0, stat=Sent (<email.fr> [InternalId=96830037688413, Hostname=sphinx] 12426 bytes in 0.118, 102,604 KB/sec Queued mail for delivery)\"",
    "event": {
        "action": "NONE",
        "category": "smtp",
        "kind": "event",
        "message": "to=<sjira.eu>, delay=00:00:02, xdelay=00:00:01, mailer=esmtp, pri=40733, relay=mail.eu. [1.1.1.1], dsn=2.0.0, stat=Sent (<email.fr> [InternalId=96830037688413, Hostname=sphinx] 12426 bytes in 0.118, 102,604 KB/sec Queued mail for delivery)",
        "reason": "Sent (<email.fr> [InternalId=96830037688413, Hostname=sphinx] 12426 bytes in 0.118, 102,604 KB/sec Queued mail for delivery)"
    },
    "action": {
        "outcome_reason": "to=<sjira.eu>, delay=00:00:02, xdelay=00:00:01, mailer=esmtp, pri=40733, relay=mail.eu. [1.1.1.1], dsn=2.0.0, stat=Sent (<email.fr> [InternalId=96830037688413, Hostname=sphinx] 12426 bytes in 0.118, 102,604 KB/sec Queued mail for delivery)",
        "properties": {
            "delay": "00:00:02",
            "device_id": "FEVM020000087260",
            "dsn_version": "2.0.0",
            "log_id": "0003014581",
            "mailer": "esmtp",
            "priority_level_msg": "40733",
            "session_id": "13RDCREi014579-13RDCREj014579",
            "user_identifier": "mail",
            "xdelay": "00:00:01"
        }
    },
    "destination": {
        "address": "mail.eu.",
        "domain": "mail.eu.",
        "ip": "1.1.1.1",
        "size_in_char": 8
    },
    "host": {
        "name": "1234"
    },
    "log": {
        "hostname": "1234",
        "level": "information"
    },
    "related": {
        "hosts": [
            "mail.eu."
        ],
        "ip": [
            "1.1.1.1"
        ],
        "user": [
            "mail"
        ]
    },
    "user": {
        "email": "<sjira.eu>",
        "name": "mail"
    }
}
{
    "message": "time=17:34:06.188 device_id=0000 log_id=123 type=kevent subtype=dns pri=information  msg=\"UDP DNS response is truncated, try DNS query in TCP (happened 385350 time(s)), DNS question section:{name=something.com, qtype=16, class=1}\"",
    "event": {
        "category": "dns",
        "kind": "kevent",
        "message": "UDP DNS response is truncated, try DNS query in TCP (happened 385350 time(s)), DNS question section:{name=something.com, qtype=16, class=1}"
    },
    "action": {
        "outcome_reason": "UDP DNS response is truncated, try DNS query in TCP (happened 385350 time(s)), DNS question section:{name=something.com, qtype=16, class=1}",
        "properties": {
            "device_id": "0000",
            "log_id": "123"
        }
    },
    "host": {
        "name": "hostname"
    },
    "log": {
        "hostname": "hostname",
        "level": "information"
    }
}
{
    "message": "time=11:19:15.002 device_id=123 log_id=0701031743 type=kevent subtype=admin pri=information scope=o365 user=j.doe ui=GUI(1.2.3.4) action=login status=success reason=none msg=\"User j.doe login successfully from GUI(1.2.3.4)\"",
    "event": {
        "action": "login",
        "category": "admin",
        "kind": "kevent",
        "message": "User j.doe login successfully from GUI(1.2.3.4)"
    },
    "action": {
        "outcome_reason": "User j.doe login successfully from GUI(1.2.3.4)",
        "properties": {
            "device_id": "123",
            "event_status": "success",
            "log_id": "0701031743",
            "user_identifier": "GUI(1.2.3.4)"
        }
    },
    "log": {
        "level": "information"
    },
    "related": {
        "user": [
            "j.doe"
        ]
    },
    "user": {
        "name": "j.doe"
    }
}
{
    "message": "time=14:35:47.153 device_id=123 log_id=0000 type=event subtype=smtp pri=information  user=mail ui=mail action=NONE status=N/A session_id=\"14SCZkrD013672-14SCZkrF013672\" msg=\"STARTTLS=client, cert-subject=/CN=EX-01, cert-issuer=/CN=EX-01, verifymsg=unable to get local issuer certificate\"",
    "event": {
        "action": "NONE",
        "category": "smtp",
        "kind": "event",
        "message": "STARTTLS=client, cert-subject=/CN=EX-01, cert-issuer=/CN=EX-01, verifymsg=unable to get local issuer certificate",
        "reason": "unable to get local issuer certificate"
    },
    "action": {
        "outcome_reason": "STARTTLS=client, cert-subject=/CN=EX-01, cert-issuer=/CN=EX-01, verifymsg=unable to get local issuer certificate",
        "properties": {
            "device_id": "123",
            "log_id": "0000",
            "session_id": "14SCZkrD013672-14SCZkrF013672",
            "start_tls": "client",
            "user_identifier": "mail"
        }
    },
    "host": {
        "name": "hostname"
    },
    "log": {
        "hostname": "hostname",
        "level": "information"
    },
    "related": {
        "user": [
            "mail"
        ]
    },
    "tls": {
        "client": {
            "issuer": "/CN=EX-01",
            "subject": "/CN=EX-01"
        }
    },
    "user": {
        "name": "mail"
    }
}
{
    "message": "time=16:10:33.138 device_id=123 log_id=123 type=event subtype=smtp pri=information  user=mail ui=mail action=NONE status=N/A session_id=\"000\" msg=\"STARTTLS=server, cert-subject=/C=US/ST=California/L=Mountain View/O=Google LLC/CN=something.com, cert-issuer=issuer, verifymsg=unable to get local issuer certificate\"",
    "event": {
        "action": "NONE",
        "category": "smtp",
        "kind": "event",
        "message": "STARTTLS=server, cert-subject=/C=US/ST=California/L=Mountain View/O=Google LLC/CN=something.com, cert-issuer=issuer, verifymsg=unable to get local issuer certificate",
        "reason": "unable to get local issuer certificate"
    },
    "action": {
        "outcome_reason": "STARTTLS=server, cert-subject=/C=US/ST=California/L=Mountain View/O=Google LLC/CN=something.com, cert-issuer=issuer, verifymsg=unable to get local issuer certificate",
        "properties": {
            "device_id": "123",
            "log_id": "123",
            "session_id": "000",
            "start_tls": "server",
            "user_identifier": "mail"
        }
    },
    "host": {
        "name": "ABC"
    },
    "log": {
        "hostname": "ABC",
        "level": "information"
    },
    "related": {
        "user": [
            "mail"
        ]
    },
    "tls": {
        "server": {
            "issuer": "issuer",
            "subject": "/C=US/ST=California/L=Mountain View/O=Google LLC/CN=something.com"
        }
    },
    "user": {
        "name": "mail"
    }
}
{
    "message": "time=14:25:48.564 device_id=123 log_id=0000 type=event subtype=smtp pri=information  user=mail ui=mail action=NONE status=N/A session_id=\"0000\" msg=\"STARTTLS=server, cert-subject=/something.fr, cert-issuer=issuer name, verifymsg=self signed certificate in certificate chain\"",
    "event": {
        "action": "NONE",
        "category": "smtp",
        "kind": "event",
        "message": "STARTTLS=server, cert-subject=/something.fr, cert-issuer=issuer name, verifymsg=self signed certificate in certificate chain",
        "reason": "self signed certificate in certificate chain"
    },
    "action": {
        "outcome_reason": "STARTTLS=server, cert-subject=/something.fr, cert-issuer=issuer name, verifymsg=self signed certificate in certificate chain",
        "properties": {
            "device_id": "123",
            "log_id": "0000",
            "session_id": "0000",
            "start_tls": "server",
            "user_identifier": "mail"
        }
    },
    "host": {
        "name": "hostname"
    },
    "log": {
        "hostname": "hostname",
        "level": "information"
    },
    "related": {
        "user": [
            "mail"
        ]
    },
    "tls": {
        "server": {
            "issuer": "issuer name",
            "subject": "/something.fr"
        }
    },
    "user": {
        "name": "mail"
    }
}
{
    "message": "time=10:50:36.931 device_id=FEVM020000087260 log_id=0003008733 type=event subtype=smtp pri=information  user=mail ui=mail action=NONE status=N/A session_id=\"1548fVq5008733-1548fVq5008733\" msg=\"to=postmaster, delay=00:00:50, mailer=local, pri=58900, dsn=5.1.1, stat=User unknown(Reason from remote:550 5.1.1 User unknown)\"",
    "event": {
        "action": "NONE",
        "category": "smtp",
        "kind": "event",
        "message": "to=postmaster, delay=00:00:50, mailer=local, pri=58900, dsn=5.1.1, stat=User unknown(Reason from remote:550 5.1.1 User unknown)",
        "reason": "User unknown(Reason from remote:550 5.1.1 User unknown)"
    },
    "action": {
        "outcome_reason": "to=postmaster, delay=00:00:50, mailer=local, pri=58900, dsn=5.1.1, stat=User unknown(Reason from remote:550 5.1.1 User unknown)",
        "properties": {
            "delay": "00:00:50",
            "device_id": "FEVM020000087260",
            "dsn_version": "5.1.1",
            "log_id": "0003008733",
            "mailer": "local",
            "priority_level_msg": "58900",
            "session_id": "1548fVq5008733-1548fVq5008733",
            "user_identifier": "mail"
        }
    },
    "host": {
        "name": "00000"
    },
    "log": {
        "hostname": "00000",
        "level": "information"
    },
    "related": {
        "user": [
            "mail"
        ]
    },
    "user": {
        "email": "postmaster",
        "name": "mail"
    }
}
{
    "message": "time=16:01:46.183 device_id=123 log_id=123 type=spam subtype=default pri=information  session_id=\"00000\" client_name=\"mail.outlook.com\" client_ip=\"2.2.2.2\" dst_ip=\"1.1.1.1\" from=\"\" to=\"mail.fr\" subject=\"D\u00e9tail de votre quarantaine: [ 1 message(s) en quarantaine entre le jeu. 15 avr. 2021 14 h 00 +0200 et le jeu. 15 avr. 2021 16 h 00 +0200 ]\" msg=\"File name: icon_deleteall.png, scanned by Antivirus Scanner(clean)\"",
    "event": {
        "category": "default",
        "kind": "spam",
        "message": "File name: icon_deleteall.png, scanned by Antivirus Scanner(clean)"
    },
    "action": {
        "outcome_reason": "File name: icon_deleteall.png, scanned by Antivirus Scanner(clean)",
        "properties": {
            "device_id": "123",
            "event_status": "clean",
            "log_id": "123",
            "session_id": "00000"
        }
    },
    "destination": {
        "address": "1.1.1.1",
        "ip": "1.1.1.1"
    },
    "email": {
        "subject": "D\u00e9tail de votre quarantaine: [ 1 message(s) en quarantaine entre le jeu. 15 avr. 2021 14 h 00 +0200 et le jeu. 15 avr. 2021 16 h 00 +0200 ]",
        "to": {
            "address": [
                "mail.fr"
            ]
        }
    },
    "file": {
        "name": "icon_deleteall.png",
        "type": "file"
    },
    "host": {
        "name": "hostname"
    },
    "log": {
        "hostname": "hostname",
        "level": "information"
    },
    "related": {
        "ip": [
            "1.1.1.1",
            "2.2.2.2"
        ]
    },
    "source": {
        "address": "mail.outlook.com",
        "ip": "2.2.2.2"
    }
}
{
    "message": "time=15:08:03.466 device_id=device log_id=121416 type=spam subtype=default pri=information  session_id=\"123456\" client_name=\"client\" client_ip=\"2.2.2.2\" dst_ip=\"1.1.1.1\" from=\"whatever.com\" to=\"something.com\" subject=\"d\u00e9finitivement aim\u00e9 cette id\u00e9e et a pris la d\u00e9cision de vous la montrer\" msg=\"FortiGuard-AntiSpam identified spam URL: http://something.something.photos/apmix\"",
    "event": {
        "category": "default",
        "kind": "spam",
        "message": "FortiGuard-AntiSpam identified spam URL: http://something.something.photos/apmix"
    },
    "action": {
        "outcome_reason": "FortiGuard-AntiSpam identified spam URL: http://something.something.photos/apmix",
        "properties": {
            "device_id": "device",
            "log_id": "121416",
            "session_id": "123456"
        }
    },
    "destination": {
        "address": "1.1.1.1",
        "ip": "1.1.1.1"
    },
    "email": {
        "from": {
            "address": [
                "whatever.com"
            ]
        },
        "subject": "d\u00e9finitivement aim\u00e9 cette id\u00e9e et a pris la d\u00e9cision de vous la montrer",
        "to": {
            "address": [
                "something.com"
            ]
        }
    },
    "host": {
        "name": "abc"
    },
    "log": {
        "hostname": "abc",
        "level": "information"
    },
    "related": {
        "ip": [
            "1.1.1.1",
            "2.2.2.2"
        ]
    },
    "source": {
        "address": "client",
        "ip": "2.2.2.2"
    },
    "url": {
        "full": "http://something.something.photos/apmix"
    }
}
{
    "message": "time=10:00:08.543 device_id=abc log_id=0300025551 type=spam subtype=default pri=information  session_id=\"123456\" client_name=\"something.live\" client_ip=\"2.2.2.2\" dst_ip=\"1.1.1.1\" from=\"nereply.live\" to=\"info@pms-becus.com\" subject=\"new order to UK\" msg=\"File name: file.ppt(checksum:122452), scanned by Antivirus Scanner(detected)\"",
    "event": {
        "category": "default",
        "kind": "spam",
        "message": "File name: file.ppt(checksum:122452), scanned by Antivirus Scanner(detected)"
    },
    "action": {
        "outcome_reason": "File name: file.ppt(checksum:122452), scanned by Antivirus Scanner(detected)",
        "properties": {
            "device_id": "abc",
            "event_status": "detected",
            "log_id": "0300025551",
            "session_id": "123456"
        }
    },
    "destination": {
        "address": "1.1.1.1",
        "ip": "1.1.1.1"
    },
    "email": {
        "from": {
            "address": [
                "nereply.live"
            ]
        },
        "subject": "new order to UK",
        "to": {
            "address": [
                "info@pms-becus.com"
            ]
        }
    },
    "file": {
        "hash": {
            "sha256": "122452"
        },
        "name": "file.ppt",
        "type": "file"
    },
    "host": {
        "name": "abc"
    },
    "log": {
        "hostname": "abc",
        "level": "information"
    },
    "related": {
        "hash": [
            "122452"
        ],
        "ip": [
            "1.1.1.1",
            "2.2.2.2"
        ]
    },
    "source": {
        "address": "something.live",
        "ip": "2.2.2.2"
    }
}
{
    "message": "time=09:59:32.943 device_id=FEVM020000087260 log_id=0300025171 type=spam subtype=default pri=information  session_id=\"15N7xWCW025167-15N7xWCX025167\" client_name=\"mail@sth.com\" client_ip=\"2.2.2.2\" dst_ip=\"1.1.1.1\" from=\"target.fr\" to=\"source.com\" subject=\"Vos impressions de documents au meilleur prix !\" msg=\"FortiGuard-WebFilter identified URL: url.fr, category: Spam URLs, id: 86.\"",
    "event": {
        "category": "default",
        "kind": "spam",
        "message": "FortiGuard-WebFilter identified URL: url.fr, category: Spam URLs, id: 86."
    },
    "action": {
        "outcome_reason": "FortiGuard-WebFilter identified URL: url.fr, category: Spam URLs, id: 86.",
        "properties": {
            "device_id": "FEVM020000087260",
            "log_id": "0300025171",
            "session_id": "15N7xWCW025167-15N7xWCX025167",
            "spam_category": "Spam URLs",
            "spam_id": 86
        }
    },
    "destination": {
        "address": "1.1.1.1",
        "ip": "1.1.1.1"
    },
    "email": {
        "from": {
            "address": [
                "target.fr"
            ]
        },
        "subject": "Vos impressions de documents au meilleur prix !",
        "to": {
            "address": [
                "source.com"
            ]
        }
    },
    "host": {
        "name": "12345"
    },
    "log": {
        "hostname": "12345",
        "level": "information"
    },
    "related": {
        "ip": [
            "1.1.1.1",
            "2.2.2.2"
        ]
    },
    "source": {
        "address": "mail@sth.com",
        "ip": "2.2.2.2"
    },
    "url": {
        "full": "url.fr"
    }
}
{
    "message": "time=14:16:45.427 device_id=123 log_id=0300017253 type=spam subtype=default pri=information  session_id=\"15N7xWCW025167-15N7xWCX025167\" client_name=\"mail.example.org\" client_ip=\"1.2.3.4\" dst_ip=\"5.6.7.8\" from=\"johndoe@example.org\" to=\"jane.doe@example.org\" subject=\"Ring phone promotion\" msg=\"FortiGuard-WebFilter identified URL(category: Phishing, id: 61): https://www.example.org/emailing/promotion.html\"",
    "event": {
        "category": "default",
        "kind": "spam",
        "message": "FortiGuard-WebFilter identified URL(category: Phishing, id: 61): https://www.example.org/emailing/promotion.html"
    },
    "action": {
        "outcome_reason": "FortiGuard-WebFilter identified URL(category: Phishing, id: 61): https://www.example.org/emailing/promotion.html",
        "properties": {
            "device_id": "123",
            "log_id": "0300017253",
            "session_id": "15N7xWCW025167-15N7xWCX025167"
        }
    },
    "destination": {
        "address": "5.6.7.8",
        "ip": "5.6.7.8"
    },
    "email": {
        "from": {
            "address": [
                "johndoe@example.org"
            ]
        },
        "subject": "Ring phone promotion",
        "to": {
            "address": [
                "jane.doe@example.org"
            ]
        }
    },
    "host": {
        "name": "12345"
    },
    "log": {
        "hostname": "12345",
        "level": "information"
    },
    "related": {
        "ip": [
            "1.2.3.4",
            "5.6.7.8"
        ]
    },
    "source": {
        "address": "mail.example.org",
        "ip": "1.2.3.4"
    },
    "url": {
        "domain": "www.example.org",
        "original": "https://www.example.org/emailing/promotion.html",
        "path": "/emailing/promotion.html",
        "port": 443,
        "registered_domain": "example.org",
        "scheme": "https",
        "subdomain": "www",
        "top_level_domain": "org"
    }
}
{
    "message": "time=11:37:27.544 device_id=ABC log_id=0200017947 type=statistics pri=information  session_id=\"123\" client_name=\"Address.com\" client_ip=\"2.2.2.2\" client_cc=\"FR\" dst_ip=\"1.1.1.1\" from=\"something.fr\" hfrom=\"something.fr\" to=\"something.fr\" polid=\"0:1:1\" domain=\"host.com\" mailer=\"mta\" resolved=\"OK\" src_type=\"int\" direction=\"in\" virus=\"\" disposition=\"Accept\" classifier=\"Domain Safe\" message_length=\"112389\" subject=confidential subject",
    "event": {
        "kind": "statistics",
        "outcome": "Accept"
    },
    "action": {
        "outcome": "Accept",
        "outcome_reason": "Domain Safe",
        "properties": {
            "device_id": "ABC",
            "dns_resolution_attempt": "OK",
            "host_sender": "something.fr",
            "log_id": "0200017947",
            "mailer": "mta",
            "policy_id": "0:1:1",
            "session_id": "123",
            "source_country": "FR",
            "src_type": "int"
        }
    },
    "destination": {
        "address": "1.1.1.1",
        "ip": "1.1.1.1"
    },
    "email": {
        "from": {
            "address": [
                "something.fr"
            ]
        },
        "to": {
            "address": [
                "something.fr"
            ]
        }
    },
    "host": {
        "name": "B96f1GJTxDUKbh2l"
    },
    "http": {
        "request": {
            "bytes": 112389
        }
    },
    "log": {
        "hostname": "B96f1GJTxDUKbh2l",
        "level": "information"
    },
    "network": {
        "direction": "in"
    },
    "related": {
        "hosts": [
            "host.com"
        ],
        "ip": [
            "1.1.1.1",
            "2.2.2.2"
        ]
    },
    "source": {
        "address": "Address.com",
        "domain": "host.com",
        "ip": "2.2.2.2",
        "size_in_char": 8
    }
}
{
    "message": "time=16:17:10.683 device_id=ABC log_id=1234271 type=virus subtype=fortisandbox pri=information  from=\"\" to=\"\" client_name=\"\" client_ip=\"\" session_id=\"123456789\" msg=\"File file.pdf (checksum: 1234271) has been scanned by FortiSandbox. Scan result: rating=CLEAN\"",
    "event": {
        "category": "fortisandbox",
        "kind": "virus",
        "message": "File file.pdf (checksum: 1234271) has been scanned by FortiSandbox. Scan result: rating=CLEAN"
    },
    "action": {
        "outcome_reason": "File file.pdf (checksum: 1234271) has been scanned by FortiSandbox. Scan result: rating=CLEAN",
        "properties": {
            "device_id": "ABC",
            "event_status": "CLEAN",
            "log_id": "1234271",
            "session_id": "123456789"
        }
    },
    "file": {
        "hash": {
            "sha256": "1234271"
        },
        "name": "file.pdf",
        "type": "file"
    },
    "host": {
        "name": "hostname"
    },
    "log": {
        "hostname": "hostname",
        "level": "information"
    },
    "related": {
        "hash": [
            "1234271"
        ]
    }
}
{
    "message": "time=14:18:20.030 device_id=123 log_id=0103021373 type=virus subtype=fortisandbox pri=information  scope=o365 from=\"\" to=\"\" client_name=\"\" client_ip=\"\" session_id=\"15N7xWCW025167-15N7xWCX025167\" msg=\"URL https://example.org/path/image.jpg has been scanned by FortiSandbox. Scan result: rating=CLEAN\"",
    "event": {
        "category": "fortisandbox",
        "kind": "virus",
        "message": "URL https://example.org/path/image.jpg has been scanned by FortiSandbox. Scan result: rating=CLEAN"
    },
    "action": {
        "outcome_reason": "URL https://example.org/path/image.jpg has been scanned by FortiSandbox. Scan result: rating=CLEAN",
        "properties": {
            "device_id": "123",
            "log_id": "0103021373",
            "session_id": "15N7xWCW025167-15N7xWCX025167"
        }
    },
    "host": {
        "name": "hostname"
    },
    "log": {
        "hostname": "hostname",
        "level": "information"
    },
    "url": {
        "domain": "example.org",
        "original": "https://example.org/path/image.jpg",
        "path": "/path/image.jpg",
        "port": 443,
        "registered_domain": "example.org",
        "scheme": "https",
        "top_level_domain": "org"
    }
}
{
    "message": "time=14:18:14.805 device_id=123 log_id=0103001910 type=virus subtype=fortisandbox pri=information  from=\"\" to=\"\" client_name=\"\" client_ip=\"\" session_id=\"15N7xWCW025167-15N7xWCX025167\" msg=\"URL https://example.org/path/image.jpg has been scanned by FortiSandbox. Scan result: rating=CLEAN\"",
    "event": {
        "category": "fortisandbox",
        "kind": "virus",
        "message": "URL https://example.org/path/image.jpg has been scanned by FortiSandbox. Scan result: rating=CLEAN"
    },
    "action": {
        "outcome_reason": "URL https://example.org/path/image.jpg has been scanned by FortiSandbox. Scan result: rating=CLEAN",
        "properties": {
            "device_id": "123",
            "log_id": "0103001910",
            "session_id": "15N7xWCW025167-15N7xWCX025167"
        }
    },
    "log": {
        "level": "information"
    },
    "url": {
        "domain": "example.org",
        "original": "https://example.org/path/image.jpg",
        "path": "/path/image.jpg",
        "port": 443,
        "registered_domain": "example.org",
        "scheme": "https",
        "top_level_domain": "org"
    }
}

Extracted Fields

The following table lists the fields that are extracted, normalized under the ECS format, analyzed and indexed by the parser. It should be noted that infered fields are not listed.

Name Type Description
action.properties.bits_sent_ratio keyword
action.properties.class keyword
action.properties.daemon keyword
action.properties.delay keyword
action.properties.device_id keyword
action.properties.dns_resolution_attempt keyword
action.properties.dsn_version keyword
action.properties.event_status keyword
action.properties.host_sender keyword
action.properties.hostname_info keyword
action.properties.log_id keyword
action.properties.mailer keyword
action.properties.message_id keyword
action.properties.nrcpts keyword
action.properties.policy_id keyword
action.properties.priority_level_msg keyword
action.properties.relay keyword
action.properties.session_id keyword
action.properties.source_country keyword
action.properties.spam_category keyword
action.properties.spam_id number
action.properties.src_type keyword
action.properties.start_tls keyword
action.properties.stat keyword
action.properties.user_identifier keyword
action.properties.verify keyword
action.properties.virus keyword
action.properties.xdelay keyword
destination.address keyword Destination network address.
destination.domain keyword The domain name of the destination.
destination.ip ip IP address of the destination.
destination.size_in_char number
email.from.address array
email.subject keyword The subject of the email message.
email.to.address array
event.action keyword The action captured by the event.
event.category keyword Event category. The second categorization field in the hierarchy.
event.kind keyword The kind of the event. The highest categorization field in the hierarchy.
event.reason keyword Reason why this event happened, according to the source
file.hash.sha256 keyword SHA256 hash.
file.name keyword Name of the file including the extension, without the directory.
file.size long File size in bytes.
file.type keyword File type (file, dir, or symlink).
http.request.bytes long Total size in bytes of the request (body and headers).
log.level keyword Log level of the log event.
network.direction keyword Direction of the network traffic.
network.protocol keyword Application protocol name.
source.address keyword Source network address.
source.domain keyword The domain name of the source.
source.ip ip IP address of the source.
source.size_in_char number
tls.cipher keyword String indicating the cipher used during the current connection.
tls.client.issuer keyword Distinguished name of subject of the issuer of the x.509 certificate presented by the client.
tls.client.subject keyword Distinguished name of subject of the x.509 certificate presented by the client.
tls.server.issuer keyword Subject of the issuer of the x.509 certificate presented by the server.
tls.server.subject keyword Subject of the x.509 certificate presented by the server.
url.full wildcard Full unparsed URL.
url.original wildcard Unmodified original url as seen in the event source.
user.email keyword User email address.
user.name keyword Short name or login of the user.

Configure

FortiMail logs

On FortiMail appliances, most of the important hardware and software activities that are relevant for security detection and analysis, are logged into six files.

  • History (statistics): Records all email traffic going through the FortiMail unit.
  • System Event (kevent): Records system management activities, including changes to the system configuration as well as administrator and user log in and log outs.
  • Mail Event (event): Records mail activities.
  • Antispam (spam): Records spam detection events.
  • Antivirus (virus): Records virus intrusion events.
  • Encryption (encrypt): Records detection of IBE-related events.

Transport to the collector

Prerequisites

The following prerequisites are needed in order to setup efficient log concentration:

  • Have administrator privileges on the FortiMail appliance
  • Traffic towards the syslog must be open on UDP 514

Configure FortiMail

Configure logging to a syslog server

  1. Go to Log and Report > Log Settings > Remote.
  2. Click New to create a new entry OR double-click an existing entry to modify it. A dialog appears.
  3. Select Enable to allow logging to a remote host.
  4. In Profile name, enter a profile name.
  5. In IP, enter the IP address of the Syslog server where the FortiMail unit will store the logs.
  6. In Port, enter the UDP port number on which the Syslog server listens for connections (by default, UDP 514).
  7. From Level, select the severity level that a log message must equal or exceed in order to be recorded to this storage location.
  8. From Facility, select the facility identifier that the FortiMail unit will use to identify itself when sending log messages.

To easily identify log messages from the FortiMail unit when they are stored on a remote logging server, enter a unique facility identifier, and verify that no other network devices use the same facility identifier.

  1. From Log protocol, select Syslog.
  2. In Logging Policy Configuration, enable the types of logs you want to record to this storage location. Click the arrow to review the options.
  3. Click Create.

For detailed information about configuring a log forwarding, see Configure FortiMail Log Forwarding

Forward logs to Sekoia.io

Please consult the Syslog Forwarding documentation to forward these logs to Sekoia.io.