EXPLORE
← Back to Explore
sublimehighRule

Attachment: Excel file with suspicious template identifier

Detects Excel attachments containing a specific template identifier (TM16390866) in the EXIF metadata, which may indicate malicious or suspicious document templates being used to distribute harmful content.

Detection Query

type.inbound
and any(attachments,
        .file_type == "xlsx"
        and any(beta.parse_exif(.).fields,
                .key == "Template" and .value == "TM16390866"
        )
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Attachment: Excel file with suspicious template identifier"
description: "Detects Excel attachments containing a specific template identifier (TM16390866) in the EXIF metadata, which may indicate malicious or suspicious document templates being used to distribute harmful content."
type: "rule"
severity: "high"
source: |
  type.inbound
  and any(attachments,
          .file_type == "xlsx"
          and any(beta.parse_exif(.).fields,
                  .key == "Template" and .value == "TM16390866"
          )
  )
attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Evasion"
  - "Macros"
detection_methods:
  - "Exif analysis"
  - "File analysis"
id: "40f84b4b-396b-52e8-8d2c-f30016e4096d"