What is claimed is:1. A computing platform, comprising:at least one processor;a communication interface communicatively coupled to the at least one processor; andmemory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:train a neural network, wherein training the neural network comprises training the neural network using metric learning and sub-word embeddings, and wherein training the neural network using the metric learning comprises:inputting two or more inputs into the neural network;identifying labels corresponding to each of the two or more inputs; andprompting the neural network to produce particular embeddings based on the identified labels;receive forensics information corresponding to a plurality of message attachments;generate, for each of the plurality of message attachments, a feature representation;input the feature representations into the neural network, wherein inputting the feature representations into the neural network results in a numeric representation for each of the plurality of message attachments;apply a clustering algorithm to cluster each of the plurality of message attachments based on the numeric representations, resulting in clustering information;extract, from the clustering information, one or more indicators of compromise indicating that one or more of the plurality of attachments corresponds to a threat campaign; andsend, to an enterprise user device, user interface information comprising the one or more indicators of compromise, wherein sending the user interface information causes the enterprise user device to display a user interface identifying the one or more indicators of compromise.2. The computing platform of claim 1, wherein the neural network is a Siamese network.3. The computing platform of claim 2, wherein:the neural network is trained to produce a common embedding if the two or more inputs have corresponding labels,the neural network is trained to produce different embeddings if the two of more inputs have different labels.4. The computing platform of claim 1, wherein using the sub-word embeddings comprises training the neural network to learn a vocabulary of sub-words adapted to threat identification.5. The computing platform of claim 1, wherein the one or more indicators of compromise each correspond to a particular threat campaign.6. The computing platform of claim 1, wherein the one or more indicators of compromise indicate one or more of: a uniform resource locator (URL) known to host malicious content, a sender name, an internet protocol (IP) address, an organization name, or a country.7. The computing platform of claim 1, wherein extracting the one or more indicators of compromise comprises:identifying one or more generic indicators of compromise; andfiltering, from the one or more indicators of compromise, the one of more generic indicators of compromise.8. A method comprising:at a computing platform comprising at least one processor, a communication interface, and memory:training, by the at least one processor, a neural network, wherein training the neural network comprises training the neural network using metric learning and sub-word embeddings, and wherein training the neural network using the metric learning comprises:inputting two or more inputs into the neural network;identifying labels corresponding to each of the two or more inputs; andprompting the neural network to produce particular embeddings based on the identified labels;receiving, by the at least one processor, forensics information corresponding to a plurality of message attachments;generating, by the at least one processor and for each of the plurality of message attachments, a feature representation;inputting, by the at least one processor, the feature representations into the neural network, wherein inputting the feature representations into the neural network results in a numeric representation for each of the plurality of message attachments;applying, by the at least one processor, a clustering algorithm to cluster each of the plurality of message attachments based on the numeric representations, resulting in clustering information;extracting, by the at least one processor and from the clustering information, one or more indicators of compromise indicating that one or more of the plurality of attachments corresponds to a threat campaign; andsending, by the at least one processor and to an enterprise user device, user interface information comprising the one or more indicators of compromise, wherein sending the user interface information causes the enterprise user device to display a user interface identifying the one or more indicators of compromise.9. The method of claim 8, wherein the neural network is a Siamese network.10. The method of claim 8, wherein:the neural network is trained to produce a common embedding if the two or more inputs have corresponding labels,the neural network is trained to produce different embeddings if the two of more inputs have different labels.11. The method of claim 8, wherein using the sub-word embeddings comprises training, by the at least one processor, the neural network to learn a vocabulary of sub-words adapted to threat identification.12. The method of claim 8, wherein the one or more indicators of compromise each correspond to a particular threat campaign.13. The method of claim 8, wherein the one or more indicators of compromise indicate one or more of: a uniform resource locator (URL) known to host malicious content, a sender name, an internet protocol (IP) address, an organization name, or a country.14. The method of claim 8, wherein extracting the one or more indicators of compromise comprises:identifying, by the at least one processor, one or more generic indicators of compromise; andfiltering, by the at least one processor and from the one or more indicators of compromise, the one of more generic indicators of compromise.15. One or more non-transitory computer-readable media storing instructions that, when executed by a computing platform comprising at least one processor, a communication interface, and memory, cause the computing platform to:train a neural network, wherein training the neural network comprises training the neural network using metric learning and sub-word embeddings, and wherein training the neural network using the metric learning comprises:inputting two or more inputs into the neural network;identifying labels corresponding to each of the two or more inputs; andprompting the neural network to produce particular embeddings based on the identified labels;receive forensics information corresponding to a plurality of message attachments;generate, for each of the plurality of message attachments, a feature representation;input the feature representations into the neural network, wherein inputting the feature representations into the neural network results in a numeric representation for each of the plurality of message attachments;apply a clustering algorithm to cluster each of the plurality of message attachments based on the numeric representations, resulting in clustering information;extract, from the clustering information, one or more indicators of compromise indicating that one or more of the plurality of attachments corresponds to a threat campaign; andsend, to an enterprise user device, user interface information comprising the one or more indicators of compromise, wherein sending the user interface information causes the enterprise user device to display a user interface identifying the one or more indicators of compromise.