Skip to main content

Worked Examples: Sector CTI

Purpose

Convert sector context into specific telemetry owners, false positives, and customer relevance.

Telecom Asset Taxonomy

Asset ClassExamplesCTI RelevanceTypical Owner
Corporate ITEmail, identity, endpointsInitial access and lateral movement.Enterprise IT / SOC
BSS/OSSBilling, provisioning, service managementFraud, persistence, operational disruption.Telecom operations
Core networkEPC/5GC, HSS/UDM, IMSHigh-impact service and subscriber risk.Network engineering
Edge and accessRAN management, routers, firewallsRemote access and supply-chain exposure.Network operations
Customer support toolingCRM, ticketing, remote supportSocial engineering and account takeover.Customer operations

Threat Scenario

Scenario:
Reported telecom-focused actor targets VPN and edge appliances, then moves into operational support systems.

Customer relevance:
High if the organization operates exposed VPN gateways, third-party managed firewalls, or shared admin jump hosts between IT and telecom operations.

Evidence boundary:
Sector relevance does not prove compromise and does not prove actor attribution.

Telemetry Owner Map

TelemetryOwnerRequired Fields
VPN logsNetwork securityusername, source IP, device, auth result, MFA state
EDRSOCprocess, command line, parent process, network connection
FirewallNetwork operationssource, destination, port, policy, action
BSS/OSS auditTelecom operationsuser, action, target object, timestamp
Identity logsIAM teamsign-in, role change, MFA change, risky session

Sector-Specific False Positives

  • Vendor maintenance windows.
  • Network discovery by authorized engineering teams.
  • Emergency remote support.
  • Bulk provisioning changes during planned rollout.
  • Legitimate roaming/interconnect testing.