oleid
analyze Microsoft Office documents to detect potential security issues
TLDR
SYNOPSIS
oleid [options] files...
DESCRIPTION
oleid analyzes Microsoft Office documents (OLE and OpenXML formats) to detect potential security issues. It identifies VBA macros, encrypted content, external links, embedded objects, and other indicators commonly found in malicious documents.Part of the oletools suite, oleid provides quick triage for suspicious documents. It checks for indicators such as OLE format validity, application name, encryption, VBA macros, auto-executable macros, embedded Flash objects, and ObjectPool streams.
PARAMETERS
-j, --json
Output results in JSON format.-v, --verbose
Verbose output with additional details.-z PASSWORD
Password for opening ZIP-encrypted files.-l LEVEL
Set log level (DEBUG, INFO, WARNING, ERROR, CRITICAL).-h, --help
Display help message.
INDICATORS
Application - Creating application name
VBA Macros - Contains VBA code
Auto-executable - Auto-run macros present
Encrypted - MS Office encryption detected
ObjectPool - Embedded OLE objects
Flash objects - Embedded Flash content
CAVEATS
Heuristic analysis; may produce false positives. Requires the oletools Python package. Cannot analyze encrypted files without providing the password via -z.
HISTORY
oleid was developed by Philippe Lagadec as part of oletools, a Python toolkit for analyzing Microsoft OLE2 files (Structured Storage / Compound File Binary Format) and MS Office documents.
