Skip to content

Commit 5b183ad

Browse files
[PR #3409] added rule: Link: Office document hosted on suspicious file sharing service
1 parent 324c93d commit 5b183ad

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
name: "Link: Office document hosted on suspicious file sharing service"
2+
description: "Detects messages containing links with office document file extensions in the display text that are hosted on Telegram Bot API, free file hosts, or free subdomain hosts, excluding SharePoint."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and length(body.links) < 20
8+
9+
// message contains a link with office file extension in display text
10+
and any(body.current_thread.links,
11+
// display text suggests an office document
12+
regex.icontains(.display_text,
13+
'\.(pdf|doc|docx|xls|xlsx|ppt|pptx|csv)$'
14+
)
15+
// and it's hosted on Telegram Bot API
16+
and (
17+
(
18+
.href_url.domain.root_domain == "telegram.org"
19+
and strings.istarts_with(.href_url.path, '/file/bot')
20+
)
21+
// or it's a free file host
22+
or (
23+
.href_url.domain.root_domain in $free_file_hosts
24+
and .href_url.domain.root_domain != "sharepoint.com"
25+
)
26+
or .href_url.domain.root_domain in $free_subdomain_hosts
27+
// or it's a mimecast rewrite linking to the above
28+
or (
29+
.href_url.domain.root_domain == "mimecastprotect.com"
30+
and any(.href_url.query_params_decoded["url"],
31+
strings.parse_url(.).domain.root_domain in $free_subdomain_hosts
32+
or strings.parse_url(.).domain.root_domain in $free_file_hosts
33+
)
34+
)
35+
)
36+
)
37+
38+
// negate highly trusted sender domains unless they fail DMARC authentication
39+
and (
40+
(
41+
sender.email.domain.root_domain in $high_trust_sender_root_domains
42+
and not headers.auth_summary.dmarc.pass
43+
)
44+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
45+
)
46+
and not profile.by_sender().any_false_positives
47+
48+
attack_types:
49+
- "Credential Phishing"
50+
- "Malware/Ransomware"
51+
tactics_and_techniques:
52+
- "Free file host"
53+
- "Free subdomain host"
54+
- "Social engineering"
55+
detection_methods:
56+
- "URL analysis"
57+
- "Content analysis"
58+
- "Sender analysis"
59+
id: "943ead44-cc24-5c50-9793-b20900661b90"
60+
og_id: "52109bfc-f5a6-50f2-8027-c89311168e94"
61+
testing_pr: 3409
62+
testing_sha: 79ab0e736fd424ed47d908b2bf23fdb0aea08a9b

0 commit comments

Comments
 (0)