EXPLORE
← Back to Explore
sublimeRule

Office 365 fake file share

Detection Query

type.inbound
and any(body.links, .href_url.domain.root_domain in $free_subdomain_hosts)
and headers.return_path.email != sender.email.email
and (
  length(recipients.to) == 1
  and any(recipients.to, .email.email == sender.email.email)
  and headers.return_path.email != sender.email.email
)
and 1 of (
  any(headers.hops, any(.fields, .name =~ "replyto" and .value == "")),
  strings.like(sender.display_name, "*HR*"),
  regex.icontains(subject.subject, "file was shared", "covid-19"),
  regex.icontains(body.html.inner_text, "file was shared", "scanned", "virus")
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: Office 365 fake file share
source: |
  type.inbound
  and any(body.links, .href_url.domain.root_domain in $free_subdomain_hosts)
  and headers.return_path.email != sender.email.email
  and (
    length(recipients.to) == 1
    and any(recipients.to, .email.email == sender.email.email)
    and headers.return_path.email != sender.email.email
  )
  and 1 of (
    any(headers.hops, any(.fields, .name =~ "replyto" and .value == "")),
    strings.like(sender.display_name, "*HR*"),
    regex.icontains(subject.subject, "file was shared", "covid-19"),
    regex.icontains(body.html.inner_text, "file was shared", "scanned", "virus")
  )
type: rule