Attachment: ICS calendar file with recipient address in UID field

Detects inbound messages containing ICS calendar attachments where the UID property matches the recipient's email address, indicating potential calendar-based social engineering.

Sublime rule (View on GitHub)

 1name: "Attachment: ICS calendar file with recipient address in UID field"
 2description: "Detects inbound messages containing ICS calendar attachments where the UID property matches the recipient's email address, indicating potential calendar-based social engineering."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and any(attachments,
 8          (
 9            .file_type == "ics"
10            or (
11              .file_extension == "ics"
12              or .content_type in ("application/ics", "text/calendar")
13            )
14          )
15          //
16          // This rule makes use of a beta feature and is subject to change without notice
17          // using the beta feature in custom rules is not suggested until it has been formally released
18          //
19          and any(beta.file.parse_ics(.).events,
20                  any(.raw_properties,
21                      .key == "UID" and .value == recipients.to[0].email.email
22                  )
23          )
24  )
25    
26attack_types:
27  - "Credential Phishing"
28tactics_and_techniques:
29  - "Social engineering"
30detection_methods:
31  - "File analysis"
32  - "Content analysis"
33id: "507d814e-1db5-56ce-929f-13c4c78b345f"
to-top