Uniken Security is an Indian company used by many banks and financial firms to protect their end-user applications by a product called REL-ID.
There is unfortunately very little research literature available about the product or data about how it works.
REL-ID is a end-user security product that does end-device data collection to detect malicious activity to slow down attackers.
Among it's various claims:
The following links explain a bit about how it works:
Uniken uses multiple methods to evade detection and reverse-engineering of APIs, the primary of which is a custom TLS implementation. The project is to reverse-engineer this implementation to get cleartext transmissions for any of the above apps. An explanation of the protocol is needed as well, and a Wireshark plugin that decodes the same will be a bonus.
While the above apps might be easier to work on if you have an account with the corresponding bank, all of them use the network even before you login. This gives an opportunity to understand the protocol even if you can't login to the app. As an example, here is a network capture from the Windows MahaSecure app before it reaches the login screen.
Breaking this into sections so it's easier.
No timelines for the project, you can do this at your own pace. I expect Checkpoint 1 to be quick to reach, but (2) to be much harder.