Files
blue-team-tools/rules/proxy/proxy_telegram_api.yml
T

36 lines
1.1 KiB
YAML
Raw Normal View History

2018-06-05 16:25:43 +02:00
title: Telegram API Access
2019-11-12 23:12:27 +01:00
id: b494b165-6634-483d-8c47-2026a6c52372
2021-11-27 11:33:14 +01:00
status: test
2018-06-05 16:25:43 +02:00
description: Detects suspicious requests to Telegram API without the usual Telegram User-Agent
2020-09-15 07:02:30 -06:00
author: Florian Roth
2018-06-05 16:25:43 +02:00
references:
2021-11-27 11:33:14 +01:00
- https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/
- https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/
- https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
date: 2018/06/05
modified: 2021/11/27
2018-06-05 16:25:43 +02:00
logsource:
2021-11-27 11:33:14 +01:00
category: proxy
2018-06-05 16:25:43 +02:00
detection:
2021-11-27 11:33:14 +01:00
selection:
r-dns:
- 'api.telegram.org' # Often used by Bots
filter:
c-useragent|contains:
2018-06-05 16:25:43 +02:00
# Used https://core.telegram.org/bots/samples for this list
2021-11-27 11:33:14 +01:00
- 'Telegram'
- 'Bot'
condition: selection and not filter
2018-06-05 16:25:43 +02:00
fields:
2021-11-27 11:33:14 +01:00
- ClientIP
- c-uri
- c-useragent
2018-06-05 16:25:43 +02:00
falsepositives:
2021-11-27 11:33:14 +01:00
- Legitimate use of Telegram bots in the company
2018-06-05 16:25:43 +02:00
level: medium
2020-09-15 07:02:30 -06:00
tags:
2021-11-27 11:33:14 +01:00
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
- attack.t1102.002