Files
blue-team-tools/rules/network/net_susp_telegram_api.yml
T

24 lines
993 B
YAML
Raw Normal View History

2018-06-05 16:25:43 +02:00
title: Telegram Bot API Request
2019-11-12 23:12:27 +01:00
id: c64c5175-5189-431b-a55e-6d9882158251
2018-06-05 16:25:43 +02:00
status: experimental
description: Detects suspicious DNS queries to api.telegram.org used by Telegram Bots of any kind
2020-09-15 07:02:30 -06:00
author: Florian Roth
date: 2018/06/05
2021-08-09 17:23:15 +02:00
modified: 2021/08/09
2018-06-05 16:25:43 +02:00
references:
- https://core.telegram.org/bots/faq
- https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/
- https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/
- https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
logsource:
category: dns
detection:
selection:
2021-08-09 17:23:15 +02:00
query: 'api.telegram.org' # Telegram Bot API Request https://core.telegram.org/bots/faq
2018-06-05 16:25:43 +02:00
condition: selection
falsepositives:
- Legitimate use of Telegram bots in the company
2020-09-15 07:02:30 -06:00
level: medium
tags:
- attack.command_and_control
- attack.t1102.002