Mimecast Integration
editMimecast Integration
editVersion |
2.4.1 (View all) |
Compatible Kibana version(s) |
8.15.0 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Partner |
The Mimecast integration collects events from the Mimecast API.
Configuration
editv1 API Endpoints
editAuthorization parameters for the Mimecast API (Application Key
, Application
ID
, Access Key
, and Secret Key
) should be provided by a Mimecast
representative for this integration. Under Advanced options
you can set the
time interval between two API requests as well as the API URL. A Mimecast
representative should also be able to give you this information in case you need
to change the defaults.
Rate limit quotas may require you to set up different credentials for the different available log types.
v2 API Endpoints
editAuthorization parameters for the Mimecast API (Client ID
and Client Key
) should
be provided by a Mimecast representative for this integration. Under Advanced options
you can set the time interval between two API requests as well as the API URL. A Mimecast
representative should also be able to give you this information in case you need
to change the defaults.
Rate limit quotas may require you to set up different credentials for the different available log types.
Logs
editArchive Search Logs
editThis is the mimecast.archive_search_logs
dataset. These logs contain Mimecast archive
search logs with the following details: search source, description and detailed
information about the search performed. More information about these logs is available here.
Example
An example event for archive_search
looks as following:
{ "@timestamp": "2024-11-12T16:21:27.000Z", "agent": { "ephemeral_id": "d3b97519-7fb6-43c4-8b77-64243fb1a1a3", "id": "c25a1c6b-6203-415b-8548-b4a1b5c845e0", "name": "elastic-agent-14690", "type": "filebeat", "version": "8.14.0" }, "data_stream": { "dataset": "mimecast.archive_search_logs", "namespace": "34146", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "c25a1c6b-6203-415b-8548-b4a1b5c845e0", "snapshot": false, "version": "8.14.0" }, "event": { "agent_id_status": "verified", "category": [ "api" ], "created": "2024-11-12T16:21:27.000Z", "dataset": "mimecast.archive_search_logs", "ingested": "2024-12-05T00:48:50Z", "kind": "event", "original": "{\"createTime\":\"2024-11-12T16:21:27+0000\",\"description\":\"Message Tracking Search\",\"emailAddr\":\"\\u003c\\u003e\",\"searchReason\":\"\",\"searchText\":\"[User : dhamilton@mimecast.local]\",\"source\":\"archive\"}", "type": [ "admin" ] }, "input": { "type": "cel" }, "mimecast": { "search_details": { "description": "Message Tracking Search", "source": "archive", "text": "[User : dhamilton@mimecast.local]" } }, "related": { "user": [ "<>" ] }, "tags": [ "preserve_original_event", "forwarded", "mimecast-archive-search-logs" ], "user": { "email": "<>" } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.email.address |
The email address of the user who performed the search. |
keyword |
mimecast.search_details.description |
The description of the search if any. |
keyword |
mimecast.search_details.path |
The search path if any. |
keyword |
mimecast.search_details.reason |
The search reason entered when the search was executed if any. |
keyword |
mimecast.search_details.source |
The search source context |
keyword |
mimecast.search_details.text |
The text used in the search. |
keyword |
Audit Events
editThis is the mimecast.audit_events
dataset. These logs contain Mimecast audit
events with the following details: audit type, event category and detailed
information about the event. More information about these logs.
Example
An example event for audit_events
looks as following:
{ "@timestamp": "2024-10-17T02:06:50.000Z", "agent": { "ephemeral_id": "d3d233d7-62b7-40f6-8de7-d3c2937d6dae", "id": "b6346117-4ee0-428a-9d74-6580e405feeb", "name": "elastic-agent-20780", "type": "filebeat", "version": "8.14.0" }, "client": { "ip": "203.59.201.168" }, "data_stream": { "dataset": "mimecast.audit_events", "namespace": "54489", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "b6346117-4ee0-428a-9d74-6580e405feeb", "snapshot": false, "version": "8.14.0" }, "event": { "action": "api-application-updated", "agent_id_status": "verified", "category": [ "email" ], "created": "2024-10-17T02:06:50.000Z", "dataset": "mimecast.audit_events", "id": "eNoVzk0PgiAAgOH_wrUO4SizrYOasxUzs6jWLYURfqEg6Wr99-z-bs_7AZplRjFBwQp4E3y5t3G7w1SVz9KxwxtJj7mVNripeP7WV3N2-3AohNUFGw0DmMY2aqOeq7MZfCKqyME1jeUMv_qAdVub6MJdnprZIYz2PS3u-bNuB54kfA2m4GGo6ErJ_zZCi4UD51OQGd3JiqlMUjYu-eTkIdey0di_mNJC1mAFvz-isz1f", "ingested": "2024-12-05T00:52:32Z", "original": "{\"auditType\":\"API Application Updated\",\"category\":\"account_logs\",\"eventInfo\":\"API Gateway Application testing Updated. Application Program Interface Addendum (22 September 2022) acknowledged, Date: 2024-10-17, Time: 02:06:50+0000, IP: 203.59.201.168, Application: Administration Console\",\"eventTime\":\"2024-10-17T02:06:50+0000\",\"id\":\"eNoVzk0PgiAAgOH_wrUO4SizrYOasxUzs6jWLYURfqEg6Wr99-z-bs_7AZplRjFBwQp4E3y5t3G7w1SVz9KxwxtJj7mVNripeP7WV3N2-3AohNUFGw0DmMY2aqOeq7MZfCKqyME1jeUMv_qAdVub6MJdnprZIYz2PS3u-bNuB54kfA2m4GGo6ErJ_zZCi4UD51OQGd3JiqlMUjYu-eTkIdey0di_mNJC1mAFvz-isz1f\",\"user\":\"user.name@company.mime-api.com\"}" }, "input": { "type": "cel" }, "mimecast": { "application": "Administration Console", "category": "account_logs", "eventInfo": "API Gateway Application testing Updated. Application Program Interface Addendum (22 September 2022) acknowledged, Date: 2024-10-17, Time: 02:06:50+0000, IP: 203.59.201.168, Application: Administration Console" }, "related": { "ip": [ "203.59.201.168" ], "user": [ "user.name", "user.name@company.mime-api.com" ] }, "tags": [ "preserve_original_event", "forwarded", "mimecast-audit-events" ], "user": { "domain": "company.mime-api.com", "email": "user.name@company.mime-api.com", "name": "user.name" } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.2FA |
Info about two-factor authentication. |
keyword |
mimecast.application |
The Mimecast unique id of the event. |
keyword |
mimecast.category |
The category of the event. |
keyword |
mimecast.email.address |
Email address from event info. |
keyword |
mimecast.email.metadata |
The email meta data from audit info. |
keyword |
mimecast.eventInfo |
The detailed event information. |
keyword |
mimecast.method |
Method which triggers audit events. |
keyword |
mimecast.remote |
Info about remote IP trying to access the API. |
keyword |
mimecast.remote_ip |
Remote IP. |
ip |
mimecast.timezone |
Timezone reported in the event message. |
keyword |
Cloud Integrated Logs
editThis is the mimecast.cloud_integrated_logs
dataset. These logs contain Mimecast
threats and security events with the following details: entities, mail flows and URL
protected events. More information about these logs.
Example
An example event for cloud_integrated
looks as following:
{ "@timestamp": "2024-11-21T18:03:26.960Z", "agent": { "ephemeral_id": "d0571978-95ee-4d4e-9fc1-2c0b57f47a64", "id": "27a1a18b-9cc1-424a-8573-425423e11318", "name": "elastic-agent-77334", "type": "filebeat", "version": "8.15.0" }, "data_stream": { "dataset": "mimecast.cloud_integrated_logs", "namespace": "67059", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "27a1a18b-9cc1-424a-8573-425423e11318", "snapshot": false, "version": "8.15.0" }, "email": { "message_id": "<2ae37333-38e7-89ff-dc36-c8d48c6e3df3@demovation-ci.b41.one>" }, "event": { "agent_id_status": "verified", "category": [ "email" ], "created": "2024-11-21T18:03:26.960Z", "dataset": "mimecast.cloud_integrated_logs", "ingested": "2024-12-09T23:17:44Z", "original": "{\"_offset\":1803841,\"_partition\":53,\"accountId\":\"AUS2474\",\"aggregateId\":\"4XvR1B4m7BzFB8L-qk59b4szrgayciaagczc977rzb_1732212206\",\"authResults\":[{\"aligned\":true,\"result\":\"pass\",\"type\":\"SPF\"},{\"aligned\":false,\"result\":\"none\",\"type\":\"DKIM\"},{\"aligned\":null,\"result\":\"pass\",\"type\":\"DMARC\"}],\"messageId\":\"\\u003c2ae37333-38e7-89ff-dc36-c8d48c6e3df3@demovation-ci.b41.one\\u003e\",\"processingId\":\"c40337e6860db0301575d8d09362bff214c0b010d6c4d41da9d770759ff54d10_1732212206\",\"subtype\":null,\"timestamp\":1732212206960,\"type\":\"mailflow\"}" }, "input": { "type": "cel" }, "mimecast": { "accountId": "AUS2474", "aggregateId": "4XvR1B4m7BzFB8L-qk59b4szrgayciaagczc977rzb_1732212206", "authResults": [ { "aligned": true, "result": "pass", "type": "SPF" }, { "aligned": false, "result": "none", "type": "DKIM" }, { "result": "pass", "type": "DMARC" } ], "log_type": "mailflow", "processingId": "c40337e6860db0301575d8d09362bff214c0b010d6c4d41da9d770759ff54d10_1732212206" }, "tags": [ "preserve_original_event", "forwarded", "mimecast-cloud-integrated-logs" ] }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.accountId |
The Mimecast account code for your account. |
keyword |
mimecast.action |
The action taken for this message. |
keyword |
mimecast.aggregateId |
Unique identifier that allows you to correlate/group related events. |
keyword |
mimecast.attachments |
The filenames of all attachments on the emai. |
keyword |
mimecast.authResults.aligned |
boolean |
|
mimecast.authResults.result |
keyword |
|
mimecast.authResults.type |
keyword |
|
mimecast.direction |
The direction of the email based on the sending and receiving domains. |
keyword |
mimecast.historicalMail |
Identifies whether the scan was from historical email (prior to Mimecast). |
boolean |
mimecast.log_type |
keyword |
|
mimecast.messageId |
The internet message id of the email. |
keyword |
mimecast.originalUrl |
The original URL Clicked. |
keyword |
mimecast.policiesApplied.action |
keyword |
|
mimecast.policiesApplied.mode |
keyword |
|
mimecast.policiesApplied.name |
keyword |
|
mimecast.processingId |
Unique identifier that allows you to correlate/group related events. |
keyword |
mimecast.recipients |
The recipient of the email. |
keyword |
mimecast.redirectUrl |
The redirect URL, following original URL click. |
keyword |
mimecast.senderEnvelope |
The sender of the email. |
keyword |
mimecast.senderHeader |
The sender address found in the from header of the email. |
keyword |
mimecast.senderIp |
The source IP of the sending mail server. |
keyword |
mimecast.source |
keyword |
|
mimecast.sourceIp |
The source IP of the original message. |
keyword |
mimecast.subject |
The subject of the email, limited to 150 characters. |
keyword |
mimecast.subtype |
keyword |
|
mimecast.tags |
The determination if the email was untrustworthy. |
keyword |
mimecast.threatState |
The action taken. |
keyword |
mimecast.threatType |
The type of threat identified where applicable. no detections= allowed. |
keyword |
mimecast.timestamp |
The date and time of event. |
keyword |
DLP Logs
editThis is the mimecast.dlp_logs
dataset. These logs contain information about
messages that triggered a DLP or Content Examination policy. More information
about these logs.
Example
An example event for dlp
looks as following:
{ "@timestamp": "2024-11-17T19:47:39.000Z", "agent": { "ephemeral_id": "6a8bd8fb-21cf-4c1e-a294-35bddf3ebeba", "id": "890bb494-8ddc-489b-8bfe-48aea81e2d36", "name": "elastic-agent-24674", "type": "filebeat", "version": "8.14.0" }, "data_stream": { "dataset": "mimecast.dlp_logs", "namespace": "14088", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "890bb494-8ddc-489b-8bfe-48aea81e2d36", "snapshot": false, "version": "8.14.0" }, "email": { "direction": "inbound", "from": { "address": [ "webmaster@empirepartners.b41.one" ] }, "message_id": "<ae9f2f0678ed116f-152138@hapi.b41.one>", "subject": "New CERA.com Coming Soon! - CERA Alert", "to": { "address": [ "vkamins@demo-int.elastic.mime-api.com" ] } }, "event": { "action": "hold", "agent_id_status": "verified", "category": [ "email" ], "created": "2024-11-17T19:47:39+0000", "dataset": "mimecast.dlp_logs", "ingested": "2024-12-05T00:57:34Z", "original": "{\"action\":\"hold\",\"eventTime\":\"2024-11-17T19:47:39+0000\",\"messageId\":\"\\u003cae9f2f0678ed116f-152138@hapi.b41.one\\u003e\",\"policy\":\"Confidential\",\"recipientAddress\":\"vkamins@demo-int.elastic.mime-api.com\",\"route\":\"inbound\",\"senderAddress\":\"webmaster@empirepartners.b41.one\",\"subject\":\"New CERA.com Coming Soon! - CERA Alert\"}" }, "input": { "type": "cel" }, "rule": { "name": "Confidential" }, "tags": [ "preserve_original_event", "forwarded", "mimecast-dlp-logs" ] }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
Message Release Logs
editThis is the mimecast.message_release_logs
dataset. These logs contain information about
messages that were either released to the recipient, with details about the user that
processed the release. More information about these logs.
Example
An example event for message_release
looks as following:
{ "@timestamp": "2024-10-28T14:16:51.000Z", "agent": { "ephemeral_id": "7afd67cc-d1eb-44e6-9ae3-d6cdd6a2930a", "id": "019f79cd-9e55-4eaf-863d-78181137d95d", "name": "elastic-agent-60936", "type": "filebeat", "version": "8.14.0" }, "data_stream": { "dataset": "mimecast.message_release_logs", "namespace": "39938", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "019f79cd-9e55-4eaf-863d-78181137d95d", "snapshot": false, "version": "8.14.0" }, "email": { "direction": "inbound", "from": { "address": [ "yahoo-delivers@evaluation-fuzz.b41.one" ] }, "local_id": "eNoNjt0KgjAYQN9ltwlNMVZBF...", "subject": "Yahoo! Newsletter, November 2001", "to": { "address": [ "monika.causholli@demo-int.elastic.mime-api.com" ] } }, "event": { "action": "rejected", "agent_id_status": "verified", "dataset": "mimecast.message_release_logs", "id": "eNoNjt0KgjAYQN9ltwlNMVZBF...", "ingested": "2024-11-21T02:12:00Z", "kind": "event", "original": "{\"attachments\":true,\"detectionLevel\":\"relaxed\",\"fromEnv\":{\"emailAddress\":\"yahoo-delivers@evaluation-fuzz.b41.one\"},\"fromHdr\":{\"emailAddress\":\"yahoo-delivers@evaluation-fuzz.b41.one\"},\"heldReason\":\"Default Spam Scanning Definition\",\"id\":\"eNoNjt0KgjAYQN9ltwlNMVZBF...\",\"messageInfo\":\"Graymail\",\"operator\":{\"emailAddress\":\"monika.causholli@demo-int.elastic.mime-api.com\"},\"policy\":\"Default Spam Scanning Definition\",\"rejectReason\":\"Message goes against email policies\",\"released\":\"2024-10-28T14:16:51+0000\",\"route\":\"inbound\",\"size\":3670056,\"spamProcessingDetail\":{\"dkim\":{\"allow\":true,\"info\":\"unknown\"},\"dmarc\":{\"allow\":true,\"info\":\"allow\"},\"greyEmail\":false,\"managedSender\":{\"allow\":true,\"info\":\"unknown\"},\"permittedSender\":{\"allow\":true,\"info\":\"none\"},\"rbl\":{\"allow\":true,\"info\":\"\"},\"spf\":{\"allow\":true,\"info\":\"allow\"},\"verdict\":{\"categories\":[{\"name\":\"spam\",\"risk\":\"high\",\"subcategories\":[{\"augmentations\":[],\"name\":\"technology_feed\",\"risk\":\"high\"},{\"augmentations\":[{\"name\":\"body\",\"risk\":\"negligible\"}],\"name\":\"content\",\"risk\":\"negligible\"}]},{\"name\":\"graymail\",\"risk\":\"negligible\",\"subcategories\":[]}],\"decision\":\"spam\",\"description\":\"\",\"risk\":\"high\"}},\"spamScore\":20,\"status\":\"rejected\",\"subject\":\"Yahoo! Newsletter, November 2001\",\"to\":[{\"emailAddress\":\"monika.causholli@demo-int.elastic.mime-api.com\"}]}", "reason": "Message goes against email policies", "risk_score": 20, "type": [ "info" ] }, "input": { "type": "cel" }, "mimecast": { "message_release_logs": { "attachments": true, "detectionLevel": "relaxed", "fromEnv": { "emailAddress": "yahoo-delivers@evaluation-fuzz.b41.one" }, "fromHdr": { "emailAddress": "yahoo-delivers@evaluation-fuzz.b41.one" }, "heldReason": "Default Spam Scanning Definition", "id": "eNoNjt0KgjAYQN9ltwlNMVZBF...", "messageInfo": "Graymail", "operator": "monika.causholli@demo-int.elastic.mime-api.com", "policy": "Default Spam Scanning Definition", "rejectReason": "Message goes against email policies", "released": "2024-10-28T14:16:51+0000", "route": "inbound", "size": 3670056, "spamProcessingDetail": { "dkim": { "allow": true, "info": "unknown" }, "dmarc": { "allow": true, "info": "allow" }, "greyEmail": false, "managedSender": { "allow": true, "info": "unknown" }, "permittedSender": { "allow": true, "info": "none" }, "rbl": { "allow": true }, "spamVerdict": { "categories": [ { "name": "spam", "risk": "high", "subcategories": [ { "name": "technology_feed", "risk": "high" }, { "augmentations": [ { "name": "body", "risk": "negligible" } ], "name": "content", "risk": "negligible" } ] }, { "name": "graymail", "risk": "negligible" } ], "decision": "spam", "risk": "high" }, "spf": { "allow": true, "info": "allow" } }, "spamScore": 20, "status": "rejected", "subject": "Yahoo! Newsletter, November 2001", "to": [ { "emailAddress": "monika.causholli@demo-int.elastic.mime-api.com" } ] } }, "related": { "hosts": [ "demo-int.elastic.mime-api.com", "evaluation-fuzz.b41.one" ], "user": [ "monika.causholli", "monika.causholli@demo-int.elastic.mime-api.com", "yahoo-delivers", "yahoo-delivers@evaluation-fuzz.b41.one" ] }, "tags": [ "preserve_original_event", "forwarded", "mimecast-message-release-logs" ], "user": { "email": [ "monika.causholli@demo-int.elastic.mime-api.com" ] } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.message_release_logs.attachments |
Indicates whether the message contains attachments. |
boolean |
mimecast.message_release_logs.detectionLevel |
Spam detection level, if held by a spam policy. Possible values are: relaxed, moderate, aggressive, cluster or whitelisted_cluster. |
keyword |
mimecast.message_release_logs.fromEnv.displayableName |
Display name of the user address from the "from" envelope. If none exists, this field will be empty. |
keyword |
mimecast.message_release_logs.fromEnv.emailAddress |
The routable email address of the user from the "from" envelope. |
keyword |
mimecast.message_release_logs.fromHdr.displayableName |
Display name of the user address from the "from" header. If none exists, this field will be empty. |
keyword |
mimecast.message_release_logs.fromHdr.emailAddress |
The routable email address of the user from the "from" header. |
keyword |
mimecast.message_release_logs.heldGroup |
The recipient group of the held message, if message was sent to a group. |
keyword |
mimecast.message_release_logs.heldReason |
Detail around the reason the message was initially held. If held by a specific policy definition, this will be the name of the policy definition that triggered the message to be held. |
keyword |
mimecast.message_release_logs.id |
The Mimecast secure ID of the specific message release log. |
keyword |
mimecast.message_release_logs.messageInfo |
Additional information around the release reason. |
text |
mimecast.message_release_logs.operator |
Email address of the user that released the message. |
keyword |
mimecast.message_release_logs.policy |
Name of the policy definition that triggered the message to be held. |
keyword |
mimecast.message_release_logs.rejectReason |
Detail on the reason a message was rejected, if message was rejected. |
keyword |
mimecast.message_release_logs.released |
Timestamp of the message release action in ISO 8601 format. |
keyword |
mimecast.message_release_logs.route |
Message direction. Possible values are: inbound or outbound. |
keyword |
mimecast.message_release_logs.size |
Total size of the message, in bytes. |
long |
mimecast.message_release_logs.spamProcessingDetail.dkim.allow |
Indicates checks for whether the message passed DKIM checks are performed. |
boolean |
mimecast.message_release_logs.spamProcessingDetail.dkim.info |
Details about the check result. |
keyword |
mimecast.message_release_logs.spamProcessingDetail.dmarc.allow |
Indicates checks for whether the message passed DMARC checks are performed. |
boolean |
mimecast.message_release_logs.spamProcessingDetail.dmarc.info |
Details about the check result. |
keyword |
mimecast.message_release_logs.spamProcessingDetail.grayEmail |
Indicates with the spam was classified as graymail or bulk. Note that this API uses graymail and greymail interchangeably. |
boolean |
mimecast.message_release_logs.spamProcessingDetail.greyEmail |
Indicates with the spam was classified as graymail or bulk. Note that this API uses graymail and greymail interchangeably. |
boolean |
mimecast.message_release_logs.spamProcessingDetail.managedSender.allow |
Indicates checks for whether the sender has been permitted by a Managed Sender entry are performed. |
boolean |
mimecast.message_release_logs.spamProcessingDetail.managedSender.info |
Details about the check result. |
keyword |
mimecast.message_release_logs.spamProcessingDetail.permittedSender.allow |
Indicates checks for whether the sender has been permitted by policy are performed. |
boolean |
mimecast.message_release_logs.spamProcessingDetail.permittedSender.info |
Details about the check result. |
keyword |
mimecast.message_release_logs.spamProcessingDetail.rbl.allow |
Indicates checks for whether the message passed RBL checks are performed. |
boolean |
mimecast.message_release_logs.spamProcessingDetail.rbl.info |
Details about the check result. |
keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.categories |
Spam detection type categories. |
flattened |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.decision |
Indicating what the ultimate verdict was for the message. |
keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.description |
Description of the spam verdict decision. |
keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.risk |
Identified risk level within the spam detection. Possible values are: negligible, low, high. |
keyword |
mimecast.message_release_logs.spamProcessingDetail.spf.allow |
Indicates checks for whether the message passed SPF checks are performed. |
boolean |
mimecast.message_release_logs.spamProcessingDetail.spf.info |
Details about the check result. |
keyword |
mimecast.message_release_logs.spamScore |
The message spam score, based on the applied spam scanning policy definition. |
double |
mimecast.message_release_logs.status |
Status of the message. Possible values are released or rejected. |
keyword |
mimecast.message_release_logs.subject |
The released message’s subject line. |
keyword |
mimecast.message_release_logs.to.displayableName |
Display name of the user address from the "to" header. If none exists, this field will be empty. |
keyword |
mimecast.message_release_logs.to.emailAddress |
The routable email address of the user from the "to" header. |
keyword |
SIEM Logs
editThis is the mimecast.siem_logs
dataset. These logs contain information about
messages that contains MTA (message transfer agent) log – all inbound,
outbound, and internal messages. More about these logs.
Example
An example event for siem
looks as following:
{ "@timestamp": "2024-11-12T18:52:07.130Z", "agent": { "ephemeral_id": "3d21ae78-86cd-4666-84a7-c6309a29e2e5", "id": "260b2d28-beb4-4e1e-83aa-9fd450347db8", "name": "elastic-agent-64770", "type": "filebeat", "version": "8.15.0" }, "data_stream": { "dataset": "mimecast.siem_logs", "namespace": "18433", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "260b2d28-beb4-4e1e-83aa-9fd450347db8", "snapshot": false, "version": "8.15.0" }, "email": { "direction": "outbound", "from": { "address": [ "chris.germany@demo-int.elastic.mime-api.com" ] }, "message_id": "<23b9843f48f8d349-99325@hapi.b41.one>", "subject": "Out of office", "to": { "address": [ "dkinney@pacific-concept.b41.one" ] } }, "event": { "action": "Acc", "agent_id_status": "verified", "category": [ "email" ], "created": "2024-11-12T18:52:07.130Z", "dataset": "mimecast.siem_logs", "ingested": "2024-12-08T21:06:17Z", "original": "{\"_offset\":70595,\"_partition\":60,\"accountId\":\"CUSB4A274\",\"action\":\"Acc\",\"aggregateId\":\"q1h3LjgrN46b12GlX0By9Q_1731437523\",\"direction\":\"Outbound\",\"messageId\":\"\\u003c23b9843f48f8d349-99325@hapi.b41.one\\u003e\",\"numberAttachments\":\"0\",\"processingId\":\"X7OQopo8177ryv7KXWXxytbksk3qv0Ct8NSYWcQkhJM_1731437523\",\"receiptErrors\":null,\"recipients\":\"dkinney@pacific-concept.b41.one\",\"rejectionCode\":null,\"rejectionInfo\":null,\"rejectionType\":null,\"senderEnvelope\":\"chris.germany@demo-int.elastic.mime-api.com\",\"senderHeader\":\"chris.germany@demo-int.elastic.mime-api.com\",\"senderIp\":\"54.236.186.184\",\"spamDetectionLevel\":\"28\",\"spamInfo\":\"[]\",\"spamProcessingDetail\":null,\"spamScore\":\"0\",\"subject\":\"Out of office\",\"subtype\":\"Acc\",\"timestamp\":1731437527130,\"tlsCipher\":\"TLS_AES_256_GCM_SHA384\",\"tlsVersion\":\"TLSv1.3\",\"type\":\"receipt\",\"virusFound\":null}", "outcome": "unknown" }, "input": { "type": "cel" }, "mimecast": { "accountId": "CUSB4A274", "aggregateId": "q1h3LjgrN46b12GlX0By9Q_1731437523", "log_type": "receipt", "numberAttachments": "0", "processingId": "X7OQopo8177ryv7KXWXxytbksk3qv0Ct8NSYWcQkhJM_1731437523", "senderHeader": "chris.germany@demo-int.elastic.mime-api.com", "spamDetectionLevel": "28", "spamInfo": "[]", "spamScore": "0", "subtype": "Acc", "tlsVersion": "TLSv1.3" }, "related": { "user": [ "chris.germany@demo-int.elastic.mime-api.com", "dkinney@pacific-concept.b41.one" ] }, "source": { "ip": "54.236.186.184" }, "tags": [ "preserve_original_event", "forwarded", "mimecast-siem-logs" ], "tls": { "cipher": "TLS_AES_256_GCM_SHA384" } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.AttCnt |
The number of attachments on the email. |
long |
mimecast.AttNames |
The filenames of all attachments on the email. |
keyword |
mimecast.Attempt |
The count of attempts that the Mimecast MTA has made to deliver the email. |
long |
mimecast.CustomName |
The message has matched a custom name. |
keyword |
mimecast.CustomThreatDictionary |
The content of the email was detected to contain words in a custom threat dictionary. |
keyword |
mimecast.CustomerIP |
The source IP is one of the accounts authorised IPs or one of the authorised IPs belonging to an Umbrella Account, if the Account uses an Umbrella Account. |
keyword |
mimecast.Hits |
Number of items flagged for the message. |
keyword |
mimecast.Hostname |
keyword |
|
mimecast.IPInternalName |
For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detected to be from an internal user name. |
keyword |
mimecast.IPNewDomain |
For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detected to be from a new domain. |
keyword |
mimecast.IPReplyMismatch |
For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detetced to have a mismatch in the reply to address. |
keyword |
mimecast.IPSimilarDomain |
For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detetced to be from a similar domain to any domain you have registered as an Internal Domain. |
keyword |
mimecast.IPThreadDict |
For emails subject to Targeted Threat Protection - Impersonation Protect, if the content of the email was detected to contain words in the Mimecast threat dictionary. |
keyword |
mimecast.InternalName |
The email was detected to be from an internal user name. |
keyword |
mimecast.Latency |
The time in milliseconds that the delivery attempt took. |
long |
mimecast.MimecastIP |
The source IP is one of the Mimecast' IPs e.g. Mimecast Personal Portal. |
keyword |
mimecast.MsgId |
The internet message id of the email. |
keyword |
mimecast.MsgSize |
The total size of the email. |
long |
mimecast.RcptActType |
Action after reception. |
keyword |
mimecast.RcptHdrType |
Type of the receipt header. |
keyword |
mimecast.ReceiptAck |
The receipt acknowledgment message received by Mimecast from the receiving mail server. |
keyword |
mimecast.Recipient |
The recipient of the original message. |
keyword |
mimecast.ReplyMismatch |
The reply address does not correspond to the senders address. |
keyword |
mimecast.Route |
Email route. |
keyword |
mimecast.ScanResultInfo |
The reason that the click was blocked. |
keyword |
mimecast.SenderDomainInternal |
The sender domain is a registered internal domain. |
keyword |
mimecast.SimilarCustomExternalDomain |
The senders domain is similar to a custom external domain list. |
keyword |
mimecast.SimilarInternalDomain |
The senders domain is similar to a registered internal domain. |
keyword |
mimecast.SimilarMimecastExternalDomain |
The senders domain is similar to a Mimecast managed list of domains. |
keyword |
mimecast.Snt |
The amount of data in bytes that were delivered. |
long |
mimecast.SpamInfo |
Information from Mimecast Spam scanners for messages found to be Spam. |
keyword |
mimecast.SpamLimit |
The Spam limit defined for the given sender and recipient. |
long |
mimecast.SpamProcessingDetail |
The Spam processing details for DKIM, SPF, DMARC. |
flattened |
mimecast.SpamScore |
The Spam score the email was given. |
long |
mimecast.Subject |
The subject of the email, limited to 150 characters. |
keyword |
mimecast.TaggedExternal |
The message has been tagged as originating from a external source. |
keyword |
mimecast.TaggedMalicious |
The message has been tagged as malicious. |
keyword |
mimecast.ThreatDictionary |
The content of the email was detected to contain words in the Mimecast threat dictionary. |
keyword |
mimecast.UrlCategory |
The category of the URL that was clicked. |
keyword |
mimecast.Virus |
The name of the virus found on the email, if applicable. |
keyword |
mimecast.acc |
The Mimecast account code for your account. |
keyword |
mimecast.accountId |
The Mimecast account code for your account |
keyword |
mimecast.action |
The action taken at the receipt stage. Receipt logs:(Rej; Acc; Ign; Bnc), Process logs:(Acc; Hld; Bnc; Sdbx; Rty), Impersonation Protect logs:(None; Hold), URL Protect logs:(Block). |
keyword |
mimecast.aggregateId |
Unique identifier that allows you to correlate/group related events. |
keyword |
mimecast.analysis |
The senders domain is similar to a custom external domain list. |
keyword |
mimecast.attachments |
The filenames of all attachments on the email |
keyword |
mimecast.blockReason |
The reason click was blocked. (Unknown; File Detected; Clean; Malicious; Suspicious) |
keyword |
mimecast.credentialTheft |
The info about credential theft. |
keyword |
mimecast.customNameMatch |
The message has matched a custom name. True; False |
keyword |
mimecast.customThreatDictionary |
The content of the email was detected to contain words in the client custom threat dictionary. (True; False) |
keyword |
mimecast.customerIp |
The source IP is one of the accounts authorised IPs or one of the authorised IPs belonging to an Umbrella Account, if the Account uses an Umbrella Account. |
keyword |
mimecast.delivered |
* If the email was delivered successfully or not. False; True |
keyword |
mimecast.delivery |
Attempts The count of attempts that the Mimecast MTA has made to deliver the email. |
keyword |
mimecast.deliveryAttempts |
keyword |
|
mimecast.deliveryErrors |
Information about any errors that occurred on the delivery attempt. |
keyword |
mimecast.deliveryTime |
The time in milliseconds that the delivery attempt took. |
keyword |
mimecast.destinationIp |
The destination IP address for the delivery attempt. |
keyword |
mimecast.direction |
The direction of the email based on the sending and receiving domains. (Inbound; Outbound; Internal; External) |
keyword |
mimecast.emailSize |
The amount of data in bytes that were delivered. |
keyword |
mimecast.fileExtension |
The file extension. |
keyword |
mimecast.fileName |
The name of file. |
keyword |
mimecast.holdReason |
The reason the email was held for review (quarantined), if applicable. (Spm; Att; RcptLimit; Exp; Imp; Sbx; Oth; Url; Ctnt; Dpp; RBL; (absent)) |
keyword |
mimecast.internalUserName |
The email was detected to be from an internal user name. (Hit; No Hit) |
keyword |
mimecast.ipNewDomain |
For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detected to be from a new domain. |
keyword |
mimecast.ipReplyMismatch |
For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detetced to have a mismatch in the reply to address. |
keyword |
mimecast.ipSimilarDomain |
For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detetced to be from a similar domain to any domain you have registered as an Internal Domain. |
keyword |
mimecast.ipThreatDictionary |
For emails subject to Targeted Threat Protection: Impersonation Protect, if the content of the email was detected to contain words in the Mimecast threat dictionary. |
keyword |
mimecast.ipUserName |
For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detected to be from an internal user name. |
keyword |
mimecast.itemsDetected |
Number of items flagged for the message. |
keyword |
mimecast.log_type |
String to get type of SIEM log. |
keyword |
mimecast.md5 |
MD5 Hash. |
keyword |
mimecast.messageId |
The internet message id of the email. |
keyword |
mimecast.mimecastThreatDictionary |
The content of the email was detected to contain words in the Mimecast threat dictionary. (True; False) |
keyword |
mimecast.monitoredDomainSource |
the source of the URL match based on Mimecast’s heuristic scanning techniques |
keyword |
mimecast.msgid |
The internet message id of the email. |
keyword |
mimecast.newDomain |
The email was detected to be from a new domain (True; False) |
keyword |
mimecast.numberAttachments |
The number of attachments on the email. |
keyword |
mimecast.policyDefinition |
The definition of policy triggered. |
keyword |
mimecast.processingId |
Unique identifier that allows you to correlate/group related events. |
keyword |
mimecast.receiptErrors |
Information about any errors that occurred during receipt. |
keyword |
mimecast.recipients |
The recipient of the email. |
keyword |
mimecast.rejectionCode |
The rejection code, for messages rejected by the receiving mail server. |
keyword |
mimecast.rejectionInfo |
The rejection information if the email was rejected at the receipt stage. |
keyword |
mimecast.rejectionType |
The rejection type, for messages rejected by the receiving mail server. |
keyword |
mimecast.replyMismatch |
The reply address does not correspond to the senders address. (True; False) |
keyword |
mimecast.route |
The route of the message. (Inbound; Outbound; Internal; External) |
keyword |
mimecast.scanResults |
The reason that the click was blocked. |
keyword |
mimecast.senderDomain |
The sender domain. |
keyword |
mimecast.senderDomainInternal |
The sender domain is a registered internal domain. |
keyword |
mimecast.senderEnvelope |
The sender of the email. |
keyword |
mimecast.senderHeader |
Sender address found in the from header of the email. |
keyword |
mimecast.senderIp |
The source IP of the original message or sending mail server. |
keyword |
mimecast.sha1 |
SHA1 hash. |
keyword |
mimecast.sha256 |
SHA256 hash. |
keyword |
mimecast.similarCustomExternalDomain |
The senders domain is similar to a custom external domain list. (True; False) |
keyword |
mimecast.similarDomain |
The domain is similar to a registered domain. |
keyword |
mimecast.similarInternalDomain |
The senders domain is similar to a registered internal domain. (True; False) |
keyword |
mimecast.similarMimecastExternalDomain |
The senders domain is similar to a Mimecast managed list of domains. (True; False) |
keyword |
mimecast.similarMimecastExternalDomainResults |
Advanced phishing detection results from scanners |
keyword |
mimecast.sizeAttachment |
The size (in bytes) of the malicious file. |
keyword |
mimecast.sourceIp |
The source IP of the original message. |
keyword |
mimecast.spamDetectionLevel |
The detection level defined for the given sender and recipient. |
keyword |
mimecast.spamInfo |
Information from Mimecast Spam scanners for messages found to be Spam. |
keyword |
mimecast.spamProcessingDetail |
The Spam processing details for DKIM, SPF, DMARC |
keyword |
mimecast.spamScore |
The metric that measures the likelihood of the event being considered spam. |
keyword |
mimecast.subject |
The subject of the email. |
keyword |
mimecast.subtype |
keyword |
|
mimecast.taggedExternal |
The message has been tagged as originating from a external source. (True; False) |
keyword |
mimecast.taggedMalicious |
The message has been tagged as malicious. (True; False) |
keyword |
mimecast.timestamp |
The date and time of event. |
keyword |
mimecast.tlsCipher |
The TLS Cipher used if the email was delivered or received using TLS. |
keyword |
mimecast.tlsUsed |
If the message was delivered using TLS or not. (Yes; No) |
keyword |
mimecast.tlsVersion |
The TLS version used if the email was delivered or received using TLS. |
keyword |
mimecast.totalSizeAttachments |
The total size of all attachments on the email. |
keyword |
mimecast.url |
URL Clicked |
keyword |
mimecast.urlCategory |
The category of the URL that was clicked. |
keyword |
mimecast.virusFound |
The name or signature of the virus found on the email, if applicable. |
keyword |
Threat Intel Feed Malware: Customer
editThis is the mimecast.threat_intel_malware_customer
dataset. These logs contain
information about messages that return identified malware threats at a customer
level. Learn more about these logs.
Example
An example event for threat_intel_malware_customer
looks as following:
{ "@timestamp": "2024-11-18T16:08:27.231Z", "agent": { "ephemeral_id": "d1f430e4-51c4-4477-b0c8-c09935910589", "id": "2f4dbe4d-f9d3-4bb4-b16e-cc670095357a", "name": "elastic-agent-69346", "type": "filebeat", "version": "8.14.0" }, "data_stream": { "dataset": "mimecast.threat_intel_malware_customer", "namespace": "60530", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "2f4dbe4d-f9d3-4bb4-b16e-cc670095357a", "snapshot": false, "version": "8.14.0" }, "event": { "agent_id_status": "verified", "category": [ "threat", "email", "malware" ], "dataset": "mimecast.threat_intel_malware_customer", "ingested": "2024-12-05T01:02:33Z", "kind": "enrichment", "original": "{\"created\":\"2024-11-18T16:08:27.231Z\",\"id\":\"indicator--dd9dd839-2362-4e60-9685-7d0b3b8e9497\",\"labels\":[\"malicious-activity\"],\"modified\":\"2024-11-18T16:08:27.231Z\",\"pattern\":\"[file:hashes.'SHA-256' = '275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f']\",\"type\":\"indicator\",\"valid_from\":\"2024-11-18T16:08:27.231Z\"}", "type": [ "indicator" ] }, "input": { "type": "cel" }, "mimecast": { "id": "indicator--dd9dd839-2362-4e60-9685-7d0b3b8e9497", "labels": [ "malicious-activity" ], "pattern": "[file:hashes.'SHA-256' = '275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f']", "type": "indicator" }, "related": { "hash": [ "275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f" ] }, "tags": [ "preserve_original_event", "forwarded", "mimecast-threat-intel-feed-malware-customer", "malicious-activity" ], "threat": { "indicator": { "file": { "hash": { "sha256": "275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f" } }, "first_seen": "2024-11-18T16:08:27.231Z", "modified_at": "2024-11-18T16:08:27.231Z", "type": "file" } } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.created |
When the indicator was last created. |
date |
mimecast.hashtype |
The hash type. |
keyword |
mimecast.id |
The ID of the indicator. |
keyword |
mimecast.labels |
The labels related to the indicator. |
keyword |
mimecast.log_type |
String to get type of Threat intel feed. |
keyword |
mimecast.modified |
When the indicator was last modified. |
date |
mimecast.name |
Name of the file. |
keyword |
mimecast.pattern |
The pattern. |
keyword |
mimecast.relationship_type |
Type of the relationship. |
keyword |
mimecast.source_ref |
Source of the reference. |
keyword |
mimecast.target_ref |
Reference target. |
keyword |
mimecast.type |
The indicator type, can for example be "domain, email, FileHash-SHA256". |
keyword |
mimecast.valid_from |
The valid from date. |
date |
mimecast.value |
The value of the indicator. |
keyword |
Threat Intel Feed Malware: Grid
editThis is the mimecast.threat_intel_malware_grid
dataset. These logs contain
information about messages that return identified malware threats at a regional
grid level. More about these logs.
Example
An example event for threat_intel_malware_grid
looks as following:
{ "@timestamp": "2024-11-18T23:45:40.537Z", "agent": { "ephemeral_id": "5324b627-0cb0-4c9c-ade5-b381ee81af8f", "id": "e14a2fc5-d58b-4d98-a9ee-46df63eab758", "name": "elastic-agent-94233", "type": "filebeat", "version": "8.14.0" }, "data_stream": { "dataset": "mimecast.threat_intel_malware_grid", "namespace": "50567", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "e14a2fc5-d58b-4d98-a9ee-46df63eab758", "snapshot": false, "version": "8.14.0" }, "event": { "agent_id_status": "verified", "category": [ "threat", "email", "malware" ], "dataset": "mimecast.threat_intel_malware_grid", "ingested": "2024-12-05T01:20:52Z", "kind": "enrichment", "original": "{\"created\":\"2024-11-18T23:45:40.537Z\",\"id\":\"indicator--9633476b-0235-41cb-b9fb-6cc48b15391f\",\"labels\":[\"malicious-activity\"],\"modified\":\"2024-11-18T23:45:40.537Z\",\"pattern\":\"[file:hashes.'SHA-256' = '838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72']\",\"type\":\"indicator\",\"valid_from\":\"2024-11-18T23:45:40.537Z\"}", "type": [ "indicator" ] }, "input": { "type": "cel" }, "mimecast": { "id": "indicator--9633476b-0235-41cb-b9fb-6cc48b15391f", "labels": [ "malicious-activity" ], "pattern": "[file:hashes.'SHA-256' = '838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72']", "type": "indicator" }, "related": { "hash": [ "838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72" ] }, "tags": [ "preserve_original_event", "forwarded", "mimecast-threat-intel-feed-malware-grid", "malicious-activity" ], "threat": { "indicator": { "file": { "hash": { "sha256": "838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72" } }, "first_seen": "2024-11-18T23:45:40.537Z", "modified_at": "2024-11-18T23:45:40.537Z", "type": "file" } } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.created |
When the indicator was last created. |
date |
mimecast.hashtype |
The hash type. |
keyword |
mimecast.id |
The ID of the indicator. |
keyword |
mimecast.labels |
The labels related to the indicator. |
keyword |
mimecast.log_type |
String to get type of Threat intel feed. |
keyword |
mimecast.modified |
When the indicator was last modified. |
date |
mimecast.name |
Name of the file. |
keyword |
mimecast.pattern |
The pattern. |
keyword |
mimecast.relationship_type |
Type of the relationship. |
keyword |
mimecast.source_ref |
Source of the reference. |
keyword |
mimecast.target_ref |
Reference target. |
keyword |
mimecast.type |
The indicator type, can for example be "domain, email, FileHash-SHA256". |
keyword |
mimecast.valid_from |
The valid from date. |
date |
mimecast.value |
The value of the indicator. |
keyword |
TTP Attachment Logs
editThis is the mimecast.ttp_ap_logs
dataset. These logs contain Mimecast TTP
attachment protection logs with the following details: result of attachment
analysis (if it is malicious or not etc.), date when file is released, sender
and recipient address, filename and type, action triggered for the attachment,
the route of the original email containing the attachment and details.
Learn more about these logs.
Example
An example event for ttp_ap
looks as following:
{ "@timestamp": "2024-11-17T00:52:30.000Z", "agent": { "ephemeral_id": "10879bb9-44da-4174-a9f3-9c7a620c6a1b", "id": "e12e39dc-5a8b-4aef-864e-fe617a5507e2", "name": "elastic-agent-80555", "type": "filebeat", "version": "8.14.0" }, "data_stream": { "dataset": "mimecast.ttp_ap_logs", "namespace": "21632", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "e12e39dc-5a8b-4aef-864e-fe617a5507e2", "snapshot": false, "version": "8.14.0" }, "email": { "attachments": { "file": { "extension": "xlsx", "hash": { "sha256": "168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116" }, "mime_type": "application/vnd.openxmlformats-officedocument.spreadsheetml.sheet", "name": "Sandbox Test.xlsx" } }, "direction": "internal", "from": { "address": [ "eric.boyt@demo-int.elastic.mime-api.com" ] }, "message_id": "<675ddc8ccedda6a7-363046@hapi.b41.one>", "subject": "RE", "to": { "address": [ "charles.weldon@demo-int.elastic.mime-api.com" ] } }, "event": { "action": "none", "agent_id_status": "verified", "category": [ "email" ], "created": "2024-11-17T00:52:30+0000", "dataset": "mimecast.ttp_ap_logs", "ingested": "2024-12-05T01:08:12Z", "original": "{\"actionTriggered\":\"none\",\"date\":\"2024-11-17T00:52:30+0000\",\"definition\":\"Default Internal Attachment Protect Definition\",\"details\":\"Malicious \\r\\nTime taken: 0 hrs, 0 min, 1 sec\",\"fileHash\":\"168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116\",\"fileName\":\"Sandbox Test.xlsx\",\"fileType\":\"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet\",\"messageId\":\"\\u003c675ddc8ccedda6a7-363046@hapi.b41.one\\u003e\",\"recipientAddress\":\"charles.weldon@demo-int.elastic.mime-api.com\",\"result\":\"malicious\",\"route\":\"internal\",\"senderAddress\":\"eric.boyt@demo-int.elastic.mime-api.com\",\"subject\":\"RE\"}" }, "input": { "type": "cel" }, "mimecast": { "details": "Malicious \r\nTime taken: 0 hrs, 0 min, 1 sec", "result": "malicious" }, "related": { "hash": [ "168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116" ] }, "rule": { "name": "Default Internal Attachment Protect Definition" }, "tags": [ "preserve_original_event", "forwarded", "mimecast-ttp-ap" ] }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.actionTriggered |
The action triggered for the attachment. |
keyword |
mimecast.definition |
The definition. |
keyword |
mimecast.details |
Detailed output of the attachment sandbox processing. |
keyword |
mimecast.fileHash |
The hash of the attachment. |
keyword |
mimecast.fileName |
The file name of the original attachment. |
keyword |
mimecast.fileType |
The file type of the attachment. |
keyword |
mimecast.messageId |
The internet message id of the email. |
keyword |
mimecast.recipientAddress |
The address of the user that received the attachment. |
keyword |
mimecast.result |
The result of the attachment analysis - clean, malicious, unknown, or timeout. |
keyword |
mimecast.route |
The route of the original email containing the attachment, either - inbound, outbound, internal, or external. |
keyword |
mimecast.senderAddress |
The sender of the attachment. |
keyword |
mimecast.subject |
The subject of the email. |
keyword |
TTP Impersonation Logs
editThis is the mimecast.ttp_ip_logs
dataset. These logs contain information about
messages containing information flagged by an Impersonation Protection
configuration. Learn more about [these logs]
(https://integrations.mimecast.com/documentation/endpoint-reference/logs-and-statistics/get-ttp-impersonation-protect-logs/).
Example
An example event for ttp_ip
looks as following:
{ "@timestamp": "2021-11-12T15:27:14.000Z", "agent": { "ephemeral_id": "7b14936f-f3a2-4c0d-84ca-343382ff527a", "id": "628d55fb-6e16-49d4-a0ba-b6db1b4d2281", "name": "elastic-agent-89042", "type": "filebeat", "version": "8.14.0" }, "data_stream": { "dataset": "mimecast.ttp_ip_logs", "namespace": "61588", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "628d55fb-6e16-49d4-a0ba-b6db1b4d2281", "snapshot": false, "version": "8.14.0" }, "email": { "from": { "address": [ "johndoe@example.com" ] }, "message_id": "<2-MN2PR16MB2719879CA4DB60C265F7FD8FB0959@MN2PR16MB2719.namprd16.example.outlook.com>", "subject": "Don't read, just fill out!", "to": { "address": [ "johndoejr@exampple.com" ] } }, "event": { "action": "none", "agent_id_status": "verified", "category": [ "email" ], "created": "2021-11-12T15:27:14+0000", "dataset": "mimecast.ttp_ip_logs", "id": "MTOKEN:eNqrVkouLS7Jz00tSs5PSVWyUnI2MXM0N1XSUcpMUbIyMjM3MzCw0FEqSy0qzszPU7Iy1FEqyQMrNDAwV6oFAGP7Ehc", "ingested": "2024-12-05T01:13:21Z", "original": "{\"action\":\"none\",\"definition\":\"IP - 1 hit (Tag email)\",\"eventTime\":\"2021-11-12T15:27:14+0000\",\"hits\":1,\"id\":\"MTOKEN:eNqrVkouLS7Jz00tSs5PSVWyUnI2MXM0N1XSUcpMUbIyMjM3MzCw0FEqSy0qzszPU7Iy1FEqyQMrNDAwV6oFAGP7Ehc\",\"identifiers\":[\"internal_user_name\"],\"impersonationResults\":[{\"checkerResult\":\"hit\",\"impersonationDomainSource\":\"internal_user_name\",\"similarDomain\":\"John Doe \\u003cjohndoe_nu@example.com\\u003e\",\"stringSimilarToDomain\":\"John Doe\"}],\"messageId\":\"\\u003c2-MN2PR16MB2719879CA4DB60C265F7FD8FB0959@MN2PR16MB2719.namprd16.example.outlook.com\\u003e\",\"recipientAddress\":\"johndoejr@exampple.com\",\"senderAddress\":\"johndoe@example.com\",\"senderIpAddress\":\"8.8.8.8\",\"subject\":\"Don't read, just fill out!\",\"taggedExternal\":false,\"taggedMalicious\":true}" }, "input": { "type": "cel" }, "mimecast": { "hits": 1, "identifiers": [ "internal_user_name" ], "impersonationResults": [ { "checkerResult": "hit", "impersonationDomainSource": "internal_user_name", "similarDomain": "John Doe <johndoe_nu@example.com>", "stringSimilarToDomain": "John Doe" } ], "taggedExternal": false, "taggedMalicious": true }, "related": { "ip": [ "8.8.8.8" ] }, "rule": { "name": "IP - 1 hit (Tag email)" }, "source": { "ip": "8.8.8.8" }, "tags": [ "preserve_original_event", "forwarded", "mimecast-ttp-ip" ] }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.action |
The action triggered by the email. |
keyword |
mimecast.definition |
The name of the policy definition that triggered the log. |
keyword |
mimecast.hits |
The number of identifiers that the message triggered. |
long |
mimecast.id |
A token that can be used to retrieve this log again. |
keyword |
mimecast.identifiers |
The properties of the message that triggered the action - similar_internal_domain, newly_observed_domain, internal_user_name, reply_address_mismatch, and/or targeted_threat_dictionary. |
keyword |
mimecast.impersonationResults.checkerResult |
Result checker. |
keyword |
mimecast.impersonationResults.impersonationDomainSource |
Impersonation domain source. |
keyword |
mimecast.impersonationResults.similarDomain |
Similar domain. |
keyword |
mimecast.impersonationResults.stringSimilarToDomain |
The string that is suspiciously similar to a known value within the Mimecast configuration. Multiple triggers will be comma-separated. |
keyword |
mimecast.messageId |
The message-id of the identified message. |
keyword |
mimecast.recipientAddress |
The email address of the recipient of the email. |
keyword |
mimecast.senderAddress |
The email address of the sender of the message. |
keyword |
mimecast.senderIpAddress |
The source IP address of the message. |
keyword |
mimecast.subject |
The subject of the email. |
keyword |
mimecast.taggedExternal |
Whether the message was tagged as coming from an external address. |
boolean |
mimecast.taggedMalicious |
Whether the message was tagged as malicious. |
boolean |
TTP URL Logs
editThis is the mimecast.ttp_url_logs
dataset. These logs contain Mimecast TTP
attachment protection logs with the following details: the category of the URL
clicked, the email address of the user who clicked the link, the url clicked,
the action taken by the user if user awareness was applied, the route of the
email that contained the link, the action defined by the administrator for the
URL, the date that the URL was clicked, url scan result, the action that was
taken for the click, the description of the definition that triggered the URL to
be rewritten by Mimecast, the action requested by the user, an array of
components of the message where the URL was found. More about these logs.
Example
An example event for ttp_url
looks as following:
{ "@timestamp": "2024-11-13T13:03:11.000Z", "agent": { "ephemeral_id": "675bf199-2969-46bf-a9c1-8f880acc18f4", "id": "d0b37a9a-11c1-4a25-898d-0ddb211b9fd2", "name": "elastic-agent-71893", "type": "filebeat", "version": "8.14.0" }, "data_stream": { "dataset": "mimecast.ttp_url_logs", "namespace": "65054", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "d0b37a9a-11c1-4a25-898d-0ddb211b9fd2", "snapshot": false, "version": "8.14.0" }, "email": { "direction": "inbound", "from": { "address": [ "gregoryhunt@thejunglegroup.b41.one" ] }, "message_id": "<cc11f61d32d018de-152846@hapi.b41.one>", "subject": "Re", "to": { "address": [ "mike.a.roberts@demo-int.elastic.mime-api.com" ] } }, "event": { "action": "N/A", "agent_id_status": "verified", "category": [ "email" ], "created": "2024-11-13T13:03:11+0000", "dataset": "mimecast.ttp_url_logs", "ingested": "2024-12-05T01:17:02Z", "original": "{\"action\":\"warn\",\"actions\":\"Block\",\"adminOverride\":\"N/A\",\"category\":\"Dangerous file extension\",\"creationMethod\":\"Entry Scan\",\"date\":\"2024-11-13T13:03:11+0000\",\"emailPartsDescription\":[\"Attachment\"],\"fromUserEmailAddress\":\"gregoryhunt@thejunglegroup.b41.one\",\"messageId\":\"\\u003ccc11f61d32d018de-152846@hapi.b41.one\\u003e\",\"route\":\"inbound\",\"scanResult\":\"malicious\",\"sendingIp\":\"54.243.138.179\",\"subject\":\"Re\",\"tagMap\":{\"DangerousFileExt\":{\"ContentCheck:ContentScannersBlocked\":[\".exe\"],\"ContentCheck:DangerousExtsUrlFileDownload\":[\"dll\"],\"ContentCheck:DangerousMimetypesUrlFileDownload\":[\"application/x-msdownload\"],\"Inspect:FileExts\":[\"[exe]\"],\"Inspect:MimeTypes\":[\"[]\"],\"Status\":[\"CustomerSpecific\",\"VerdictBlock\"]}},\"ttpDefinition\":\"Default Inbound URL Protect Definition\",\"url\":\"https://oneclient.sfx.ms/Win/Preview/OneDriveSetup.exe\",\"userAwarenessAction\":\"N/A\",\"userEmailAddress\":\"mike.a.roberts@demo-int.elastic.mime-api.com\",\"userOverride\":\"None\"}" }, "input": { "type": "cel" }, "mimecast": { "action": "warn", "actions": "Block", "adminOverride": "N/A", "category": "Dangerous file extension", "creationMethod": "Entry Scan", "emailPartsDescription": [ "Attachment" ], "scanResult": "malicious", "tagMap": { "DangerousFileExt": { "ContentCheck_ContentScannersBlocked": [ ".exe" ], "ContentCheck_DangerousExtsUrlFileDownload": [ "dll" ], "ContentCheck_DangerousMimetypesUrlFileDownload": [ "application/x-msdownload" ], "Inspect_FileExts": [ "[exe]" ], "Inspect_MimeTypes": [ "[]" ], "Status": [ "CustomerSpecific", "VerdictBlock" ] } }, "userOverride": "None" }, "related": { "ip": [ "54.243.138.179" ], "user": [ "gregoryhunt@thejunglegroup.b41.one", "mike.a.roberts@demo-int.elastic.mime-api.com" ] }, "rule": { "name": "Default Inbound URL Protect Definition" }, "source": { "ip": "54.243.138.179" }, "tags": [ "preserve_original_event", "forwarded", "mimecast-ttp-url" ], "url": { "domain": "oneclient.sfx.ms", "extension": "exe", "original": "https://oneclient.sfx.ms/Win/Preview/OneDriveSetup.exe", "path": "/Win/Preview/OneDriveSetup.exe", "scheme": "https" }, "user": { "email": [ "mike.a.roberts@demo-int.elastic.mime-api.com" ] } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
mimecast.action |
The action that was taken for the click. |
keyword |
mimecast.actions |
The actions that were taken. |
keyword |
mimecast.adminOverride |
The action defined by the administrator for the URL. |
keyword |
mimecast.category |
The category of the URL clicked. |
keyword |
mimecast.creationMethod |
The description how event occurred. |
keyword |
mimecast.emailPartsDescription |
An array of components of the messge where the URL was found. |
keyword |
mimecast.fromUserEmailAddress |
The email of user who triggers the event. |
keyword |
mimecast.messageId |
The message-id value of the message. |
keyword |
mimecast.route |
The route of the email that contained the link. |
keyword |
mimecast.scanResult |
The result of the URL scan. |
keyword |
mimecast.sendingIp |
The IP of user who triggers the event. |
keyword |
mimecast.subject |
The subject of the email. |
keyword |
mimecast.tagMap.DangerousFileExt.ContentCheck_ContentScannersBlocked |
keyword |
|
mimecast.tagMap.DangerousFileExt.ContentCheck_DangerousExtsUrlFileDownload |
keyword |
|
mimecast.tagMap.DangerousFileExt.ContentCheck_DangerousMimetypesUrlFileDownload |
keyword |
|
mimecast.tagMap.DangerousFileExt.Inspect_FileExts |
keyword |
|
mimecast.tagMap.DangerousFileExt.Inspect_MimeTypes |
keyword |
|
mimecast.tagMap.DangerousFileExt.Status |
keyword |
|
mimecast.tagMap.UrlReputationScan.Status |
keyword |
|
mimecast.tagMap.UrlReputationScan.Type |
keyword |
|
mimecast.tagMap.UrlReputationScan.Url |
keyword |
|
mimecast.tagMap.UrlReputationScan.UrlBlock |
keyword |
|
mimecast.ttpDefinition |
The description of the definition that triggered the URL to be rewritten by Mimecast. |
keyword |
mimecast.url |
The url clicked. |
keyword |
mimecast.userAwarenessAction |
The action taken by the user if user awareness was applied. |
keyword |
mimecast.userEmailAddress |
The email address of the user who clicked the link. |
keyword |
mimecast.userOverride |
The action requested by the user. |
keyword |
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
2.4.1 |
Bug fix (View pull request) |
8.15.0 or higher |
2.4.0 |
Enhancement (View pull request) |
8.15.0 or higher |
2.3.0 |
Enhancement (View pull request) |
8.15.0 or higher |
2.2.0 |
Enhancement (View pull request) |
8.15.0 or higher |
2.1.0 |
Enhancement (View pull request) |
8.15.0 or higher |
2.0.0 |
Breaking change (View pull request) Enhancement (View pull request) |
8.14.0 or higher |
1.27.4 |
Bug fix (View pull request) |
8.14.0 or higher |
1.27.3 |
Bug fix (View pull request) |
8.14.0 or higher |
1.27.2 |
Bug fix (View pull request) |
8.14.0 or higher |
1.27.1 |
Bug fix (View pull request) |
8.14.0 or higher |
1.27.0 |
Enhancement (View pull request) |
8.14.0 or higher |
1.26.1 |
Bug fix (View pull request) |
8.13.0 or higher |
1.26.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.25.0 |
Enhancement (View pull request) |
8.12.0 or higher |
1.24.0 |
Enhancement (View pull request) |
8.12.0 or higher |
1.23.0 |
Enhancement (View pull request) |
8.12.0 or higher |
1.22.1 |
Enhancement (View pull request) |
8.7.1 or higher |
1.22.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.21.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.20.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.19.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.18.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.17.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.16.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.15.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.14.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.13.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.12.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.11.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.10.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.9.1 |
Bug fix (View pull request) |
8.7.1 or higher |
1.9.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.8.1 |
Bug fix (View pull request) |
8.5.0 or higher |
1.8.0 |
Enhancement (View pull request) |
8.5.0 or higher |
1.7.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.6.5 |
Enhancement (View pull request) |
8.3.0 or higher |
1.6.4 |
Bug fix (View pull request) |
8.3.0 or higher |
1.6.3 |
Bug fix (View pull request) |
8.3.0 or higher |
1.6.2 |
Bug fix (View pull request) |
8.3.0 or higher |
1.6.1 |
Bug fix (View pull request) |
8.3.0 or higher |
1.6.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.5.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.4.3 |
Bug fix (View pull request) |
8.3.0 or higher |
1.4.2 |
Enhancement (View pull request) |
8.3.0 or higher |
1.4.1 |
Bug fix (View pull request) |
8.3.0 or higher |
1.4.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.3.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.2.1 |
Bug fix (View pull request) |
8.3.0 or higher |
1.2.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.1.2 |
Enhancement (View pull request) |
8.3.0 or higher |
1.1.1 |
Enhancement (View pull request) |
8.3.0 or higher |
1.1.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.0.0 |
Enhancement (View pull request) Enhancement (View pull request) |
8.3.0 or higher |
0.0.12 |
Enhancement (View pull request) |
— |
0.0.11 |
Enhancement (View pull request) Bug fix (View pull request) |
— |
0.0.10 |
Enhancement (View pull request) Enhancement (View pull request) Enhancement (View pull request) |
— |
0.0.9 |
Enhancement (View pull request) |
— |
0.0.8 |
Enhancement (View pull request) |
— |
0.0.7 |
Bug fix (View pull request) |
— |
0.0.6 |
Enhancement (View pull request) |
— |
0.0.5 |
Bug fix (View pull request) Bug fix (View pull request) |
— |
0.0.4 |
Bug fix (View pull request) |
— |
0.0.3 |
Bug fix (View pull request) |
— |
0.0.2 |
Enhancement (View pull request) |
— |
0.0.1 |
Enhancement (View pull request) |
— |