diff --git a/detection-rules/spam_high_microsoft_scl_not_in_spam_folder.yml b/detection-rules/spam_high_microsoft_scl_not_in_spam_folder.yml new file mode 100644 index 00000000000..3fc047948cd --- /dev/null +++ b/detection-rules/spam_high_microsoft_scl_not_in_spam_folder.yml @@ -0,0 +1,27 @@ +name: "Microsoft Spam Confidence Level (SCL) very high and message not in spam folder" +description: | + This rule identifies messages with a Microsoft Spam Confidence Level (SCL) of 8 or 9, indicating a high likelihood of being unwanted. The rule flags these messages when they are not found in the user's spam folder, highlighting a potential risk of malicious or unwanted content. +references: + - "https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spam-spam-confidence-level-scl-about" +type: "rule" +severity: "medium" +source: | + type.inbound + and any(headers.hops, + any(.fields, strings.ilike(.name, "X-ms-exchange-organization-scl") + and .value in ("8", "9")) + ) + and external.spam is null + and ( + profile.by_sender().prevalence in ("new", "outlier") + or ( + profile.by_sender().any_messages_malicious_or_spam + and not profile.by_sender().any_false_positives + ) + ) +attack_types: + - "Spam" +detection_methods: + - "Header analysis" + - "Sender analysis" +id: "801a5470-0498-55ba-a590-4cb105038e95"