Skip to content

Commit b039994

Browse files
authored
Update telegram_detected_access_suspicious_api_url.yml
add | in the first search
1 parent 4ef0485 commit b039994

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

detections/endpoint/telegram_detected_access_suspicious_api_url.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: Zaki Zarkasih Al Mustafa
88
type: TTP
99
status: production
1010
description: Detects suspicious process activity related to Telegram API
11-
search: `wineventlog_security`
11+
search: | `wineventlog_security`
1212
AND ParentProcessName=*Telegram* AND CommandLine=*api.telegram* | eval utc_time=strptime(TimeCreated,
1313
"%Y-%m-%dT%H:%M:%S.%6NZ") | eval Time_Created=strftime(utc_time + 25200, "%Y-%m-%d
1414
%H:%M:%S") | rename Time_Created as "Time Created", host as Host, src_user as User
@@ -33,7 +33,7 @@ drilldown_searches:
3333
This drilldown searches for other processes spawned by the same parent process
3434
to identify potential patterns or related activities.
3535
search: |
36-
`wineventlog_security`
36+
``
3737
AND ParentProcessName="$ParentProcessName$"
3838
| table _time, ParentProcessName, NewProcessName, CommandLine
3939
earliest_offset: $info_min_time$
@@ -44,7 +44,7 @@ drilldown_searches:
4444
This drilldown searches for all activities performed by the same user in the
4545
Windows Event Logs to provide additional context.
4646
search: |
47-
`wineventlog_security`
47+
``
4848
AND src_user="$src_user$"
4949
| table _time, src_user, EventID, host, CommandLine
5050
earliest_offset: $info_min_time$

0 commit comments

Comments
 (0)