Service Abuse: ExactTarget with suspicious sender indicators

Message originates from ExactTarget infrastructure but uses a suspicious sender domain, including overly long salesforce.com domains, awsapps.com domains, domains containing UTF-8 encoding characters, or a suspicious sender display name.

Sublime rule (View on GitHub)

 1name: "Service Abuse: ExactTarget with suspicious sender indicators"
 2description: "Message originates from ExactTarget infrastructure but uses a suspicious sender domain, including overly long salesforce.com domains, awsapps.com domains, domains containing UTF-8 encoding characters, or a suspicious sender display name."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and any(headers.domains, .root_domain == 'exacttarget.com')
 8  and (
 9    (
10      length(sender.email.email) >= 50
11      and sender.email.domain.root_domain == "salesforce.com"
12    )
13    or sender.email.domain.root_domain == "awsapps.com"
14    or strings.icontains(sender.email.domain.domain, '?utf-8')
15    or regex.icontains(sender.display_name,
16                       '.*\|.*(Manager|Careers|Recruitment|Specialist|Global)'
17    )
18  )  
19
20attack_types:
21  - "Credential Phishing"
22  - "BEC/Fraud"
23tactics_and_techniques:
24  - "Evasion"
25  - "Social engineering"
26detection_methods:
27  - "Header analysis"
28  - "Sender analysis"
29id: "6154f197-9543-50d8-af3d-f8a7e1d79cf8"
to-top