Skip to content
Open
23 changes: 23 additions & 0 deletions detection-rules/attachment_ics_meeting_invite.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
name: "Attachment: ICS file with meeting prefix"
description: "Detects incoming messages with a single ICS calendar file attachment that has a filename starting with 'meeting_'."
type: "rule"
severity: "high"
source: |
type.inbound
and length(attachments) == 1
and any(filter(attachments,
.file_extension in~ ('ics')
or .content_type in ("application/ics", "text/calendar")
),
regex.icontains(.file_name, 'meeting_[a-zA-Z0-9]{5}\.')
and not .file_name == "meeting_invite.ics"
)
attack_types:
- "BEC/Fraud"
- "Credential Phishing"
tactics_and_techniques:
- "Social engineering"
detection_methods:
- "File analysis"
- "Header analysis"
id: "383a5810-0b85-55a8-ac9b-e7135823317b"
Loading