@@ -8,7 +8,7 @@ author: Zaki Zarkasih Al Mustafa
8
8
type : TTP
9
9
status : production
10
10
description : Detects suspicious process activity related to Telegram API
11
- search : ` wineventlog_security`
11
+ search : | `wineventlog_security`
12
12
AND ParentProcessName=*Telegram* AND CommandLine=*api.telegram* | eval utc_time=strptime(TimeCreated,
13
13
"%Y-%m-%dT%H:%M:%S.%6NZ") | eval Time_Created=strftime(utc_time + 25200, "%Y-%m-%d
14
14
%H:%M:%S") | rename Time_Created as "Time Created", host as Host, src_user as User
@@ -33,7 +33,7 @@ drilldown_searches:
33
33
This drilldown searches for other processes spawned by the same parent process
34
34
to identify potential patterns or related activities.
35
35
search : |
36
- `wineventlog_security `
36
+ ``
37
37
AND ParentProcessName="$ParentProcessName$"
38
38
| table _time, ParentProcessName, NewProcessName, CommandLine
39
39
earliest_offset : $info_min_time$
@@ -44,7 +44,7 @@ drilldown_searches:
44
44
This drilldown searches for all activities performed by the same user in the
45
45
Windows Event Logs to provide additional context.
46
46
search : |
47
- `wineventlog_security `
47
+ ``
48
48
AND src_user="$src_user$"
49
49
| table _time, src_user, EventID, host, CommandLine
50
50
earliest_offset : $info_min_time$
0 commit comments