|
| 1 | + |
| 2 | +# When email was ZAPed. |
| 3 | + |
| 4 | +This query allows to verify when email matching your search condition (by default based on presence of the URL) were ZAPed and compare it with original delivery time. |
| 5 | + |
| 6 | +## Query |
| 7 | + |
| 8 | +``` |
| 9 | +let URL=""; // Put your URL here |
| 10 | +EmailUrlInfo |
| 11 | +| where Url matches regex URL |
| 12 | +| join EmailEvents on NetworkMessageId |
| 13 | +| where DeliveryAction == "Delivered" and EmailDirection == "Inbound" |
| 14 | +| project Timestamp, NetworkMessageId, Url, SenderFromAddress, SenderIPv4, RecipientEmailAddress, Subject,DeliveryAction, DeliveryLocation |
| 15 | +| join kind=inner EmailPostDeliveryEvents on NetworkMessageId |
| 16 | +| extend DeliveryTime=(Timestamp) |
| 17 | +| extend ZAPTime=(Timestamp1) |
| 18 | +| project DeliveryTime, ZAPTime, NetworkMessageId, SenderFromAddress, SenderIPv4,RecipientEmailAddress, Subject, DeliveryAction, DeliveryLocation |
| 19 | +| sort by DeliveryTime asc |
| 20 | +``` |
| 21 | +## Category |
| 22 | + |
| 23 | +This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states. |
| 24 | + |
| 25 | +| Technique, tactic, or state | Covered? (v=yes) | Notes | |
| 26 | +|------------------------|----------|-------| |
| 27 | +| Initial access | x | | |
| 28 | +| Execution | | | |
| 29 | +| Persistence | | | |
| 30 | +| Privilege escalation | | | |
| 31 | +| Defense evasion | | | |
| 32 | +| Credential Access | | | |
| 33 | +| Discovery | | | |
| 34 | +| Lateral movement | | | |
| 35 | +| Collection | | | |
| 36 | +| Command and control | | | |
| 37 | +| Exfiltration | | | |
| 38 | +| Impact | | | |
| 39 | +| Vulnerability | | | |
| 40 | +| Misconfiguration | | | |
| 41 | +| Malware, component | | | |
| 42 | + |
| 43 | + |
| 44 | +## Contributor info |
| 45 | + |
| 46 | +**Contributor:** Pawel Partyka |
| 47 | + |
| 48 | +**GitHub alias:** pawp81 |
| 49 | + |
| 50 | +**Organization:** Microsoft |
| 51 | + |
| 52 | +**Contact info:** @pawp81 |
0 commit comments