We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent e76aaa7 commit 3d5941cCopy full SHA for 3d5941c
1 file changed
detection-rules/attachment_pdf_view_doc.yml
@@ -0,0 +1,24 @@
1
+name: "Attachment: PDF with suspicious view document characteristics"
2
+description: "PDF attachment contains suspicious characteristics commonly associated with document viewing lures, as detected by YARA pattern matching."
3
+type: "rule"
4
+severity: "medium"
5
+source: |
6
+ type.inbound
7
+ and any(filter(attachments, .file_type == "pdf"),
8
+ any(file.explode(.),
9
+ any(.scan.yara.matches,
10
+ .name == "view_document_pdf_characteristics"
11
+ )
12
13
14
+attack_types:
15
+ - "Credential Phishing"
16
+ - "Malware/Ransomware"
17
+tactics_and_techniques:
18
+ - "PDF"
19
+ - "Social engineering"
20
+ - "Evasion"
21
+detection_methods:
22
+ - "File analysis"
23
+ - "YARA"
24
+id: "8b2ec902-929b-56d2-82ff-869767bb3eff"
0 commit comments