T1137 - Office Application Startup

Tactics:
Persistence
Platforms:
Windows Office Suite
Detection:
Not specified
Description:
Adversaries may leverage Microsoft Office-based applications for persistence between startups. Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise network. There are multiple mechanisms that can be used with Office for persistence when an Office-based application is started; this can include the use of Office Template Macros and add-ins.

A variety of features have been discovered in Outlook that can be abused to obtain persistence, such as Outlook rules, forms, and Home Page.(Citation: SensePost Ruler GitHub) These persistence mechanisms can work within Outlook or be used through Office 365.(Citation: TechNet O365 Outlook Rules)
Sub-techniques (6)
ID ATT&CK Actions
T1137.001 Office Template Macros
T1137.002 Office Test
T1137.003 Outlook Forms
T1137.004 Outlook Home Page
T1137.005 Outlook Rules
T1137.006 Add-ins
Metadata
MITRE ID: T1137
STIX ID: attack-pattern--2c4d4e92-0ccf-...
Platforms: Windows, Office Suite
Created: 13/01/2026 17:48
Updated: 14/03/2026 04:00