malicious_emails
Malicious Emails
Malicious Emails
The malicious_emails data set contains indicators extracted from malicious email headers. When a malicious email (1 or more AV detections) is uploaded to VirusTotal or some other source, we download the email and parse the header to extract data such as the email’s routing information, sending emails, recipients, subject lines etc. Indicators are geo-located and sector information is added for context.
Field
Description
area_code
area code geolocated from indicator
city
city name geolocated from indicator
country
two character country code geolocated from indicator
detection
number of positive antivirus detections
domain_cat
general site categorization of indicator
email_type
type of email: either MSG or EML
etl_date
date data was exported, transformed or loaded(ETL)
first_seen
when email first observed
indicator
indicator extracted from email header
indicator_context
additional context on indicator, defines the indicator in the context of the email header
indicator_context
context of indicator as it applies to the email header
indicator_type
type of indicator extracted from email header
last_seen
when email last observed
location
latitude longitude coordinates
postal_code
postal code geolocated from indicator
raw_data_file
email file - named with prefix email_+sha256 hash
reference
link to Virus Total
region
region name geolocated from indicator
url_cat
specific site categorization of indicator
Malicious Email Data Sets all pivot on "reference" which is the common link to VirusTotal Metadata
Malicious Email Detections
The malicious_email_detections data set is a companion data set to Malicious Emails and contains vendor AV detections. We have also normalized the detection name in order to allow for easier analytics. For example, a detection name of Exploit.ComObj.CVE-2012-0158.hzuf would be changed to just cve-2012-0158.
Field
Description
detection_name
antivirus detection name
detection_shortname
normalized antivirus name
etl_date
date data was exported, transformed or loaded(ETL)
first_seen
when email first observed
last_seen
when email last observed
raw_data_file
email file - named with prefix email_+sha256 hash
reference
link to Virus Total
vendor
antivirus vendor
Malicious Email Data Sets all pivot on "reference" which is the common link to VirusTotal Metadata
Malicious Email Context
Field
Description
detections
complete list of antivirus detection names
etl_date
date data was exported, transformed or loaded(ETL)
first_seen
when email first observed
last_seen
when email last observed
raw_data_file
email file - named with prefix email_+sha256 hash
recipients
email account(s) receiving malicious email
reference
link to Virus Total
sender
email account sending email
subject_line
observed subject line
targets
organization receiving malicious email
Malicious Email Data Sets all pivot on "reference" which is the common link to VirusTotal Metadata
Last updated
Was this helpful?