Moneyout Software Architecture
Comprehensive overview of the Moneyout platform architecture — including application layers, data flows, external integrations, security model, and infrastructure design. Prepared in response to auditor inquiry under Law No. 6493.
Executive Summary
Purpose, scope, and architecture overview
Purpose
This document provides a structured description of the software architecture of Moneyout Electronic Money and Payment Services Inc. in response to the audit inquiry regarding information on software architecture. It covers the platform's architectural layers, application designs, data flows, external system integrations, security architecture, and infrastructure model.
Platform Summary
The Moneyout platform is a multi-tier, cloud-hosted payment and electronic money platform consisting of three in-house applications communicating over a central REST API, backed by a layered database architecture, secured at network and application level, and integrated with regulated third-party financial service providers.
| Layer | Components | Technology |
|---|---|---|
| Client Layer | Mobile Wallet (iOS/Android), Admin Dashboard (Web), POS Terminal | React Native, Angular 18, Android |
| API Gateway Layer | Core Payment Engine — single REST API entry point for all clients | Laravel 10 (PHP), Laravel Sanctum |
| Business Logic Layer | Wallet, Transfer, KYC, Compliance, Accounting, Notification engines | PHP Service classes, Queue Workers |
| Data Layer | Primary transactional DB, analytics DB, in-memory cache/queue | MS SQL Server 2022, MySQL, Redis |
| Infrastructure Layer | Cloud VMs, Firewall, VPN, SIEM, IAM, Backup | Turkcell Cloud, Fortinet, Active Directory |
Document Control
| Field | Value |
|---|---|
| Document Title | Moneyout — Software Architecture Overview · Auditor Response |
| Version | 1.0 |
| Classification | Confidential — For Audit Use Only |
| Legal Framework | Law No. 6493 on Payment and Security Settlement Systems, Payment Services, and Electronic Money Institutions |
| Owner | Risk and Compliance Unit |
1.1 — High-Level Architecture Overview
Platform-wide system diagram — all components and their relationships
The Moneyout platform follows a layered, API-centric architecture. All client applications communicate exclusively through the Core Payment Engine REST API. No client application accesses the database directly. External systems are integrated via secured API calls from the backend only.
1.2 — Architecture Layers Detail
Component responsibilities at each layer
2.1 — Core Payment Engine Architecture
Laravel 10 — internal layered structure and module design
The Core Payment Engine is the central backend. It follows a strict layered architecture — HTTP requests flow through middleware, controllers, service classes, repositories, and ORM models before reaching the database. No layer skips another.
| API Style | RESTful HTTP API — JSON request/response · Stateless · Token-based authentication via Laravel Sanctum |
| Real-time | WebSocket server for real-time dashboard updates and transaction status notifications to Admin Dashboard |
| Queue System | Laravel Queues + Redis as queue driver + Supervisor for worker management — handles async tasks: AML checks, notifications, settlement jobs |
| Scheduled Jobs | CronJobs on Ubuntu Server — daily settlement, report generation, reconciliation, balance checks, compliance reporting |
| Containerization | Docker — application containers for consistent, reproducible deployments across environments |
| Key Modules | Wallet Engine · Transfer Engine (FAST/EFT/International) · Card Management · KYC Engine · Compliance Engine · Accounting & GL · Notification Engine · Approval Pool · Commission Engine · Agent Management |
| Error Handling | Structured exception handling with detailed audit logging for all operations. All failed transactions logged with full context for compliance review. |
2.2 — Admin Dashboard Architecture
Angular 18 SPA — component architecture and state management
The Admin Dashboard is a single-page application (SPA) built with Angular 18. It communicates exclusively with the Core Payment Engine REST API over HTTPS. All business logic resides in the backend — the dashboard is a presentation and operation layer only.
| Architecture Pattern | Component-based SPA with NgRx (Redux pattern) for centralized state management — unidirectional data flow. Actions → Reducers → Store → Selectors → Components. |
| Module Structure | Feature modules: Money Transfer Module · Wallet Module · POS Module · Compliance/AML Module · Reporting Module · Settings Module · User Management Module |
| State Management | NgRx Store — all API calls go through NgRx Effects; state is immutable and predictable. Enables full audit trail of UI state changes. |
| UI Components | Angular Material — standardized, accessible UI component library |
| Multi-language | ngx-translate — Turkish (TR), English (EN), Arabic (AR) with full RTL layout switching |
| Authentication | Sanctum token · Auto-logout on expiry · Session tied to IP allowlist and working hours enforced server-side |
| Role-Based UI | Navigation and feature visibility controlled by user role: Admin · Operator · SuperOperator · Teller · Agent · Risk Officer · Accountant · Internal Control |
| API Communication | Angular HttpClient with interceptors for token injection and error handling. All calls to Core Payment Engine over HTTPS/TLS 1.3. |
2.3 — Mobile Wallet Architecture
React Native Expo — cross-platform iOS & Android
The MoneyOut Wallet is a cross-platform mobile application built with React Native Expo, publishing a single codebase to both Apple App Store and Google Play Store. All business logic resides in the backend API.
| Architecture Pattern | Component-based UI with a dedicated API service layer handling all communication with the Core Payment Engine REST API over HTTPS/TLS 1.3 |
| Platform Support | iOS (Apple App Store) and Android (Google Play Store) — single codebase with platform-specific native modules where required |
| Authentication | Token-based authentication (Laravel Sanctum) · Biometric unlock (Face ID / Fingerprint) via device secure enclave |
| Identity Verification | NFC-based Turkish ID (TCKN) card reading for customer identity verification — reads chip data directly from physical ID card during onboarding |
| Push Notifications | Firebase Cloud Messaging (FCM) — real-time transaction alerts and account activity notifications |
| Multi-language | Turkish (TR), English (EN), Arabic (AR) with RTL support |
| Secure Storage | Tokens stored in device secure keychain/keystore — not in plain local storage |
| No Direct DB Access | All API calls go to Core Payment Engine. No sensitive business logic or credentials stored on-device. |
3.1 — Money Transfer Transaction Flow
End-to-end processing of a domestic or international transfer
Every money transfer — domestic (FAST/EFT) or international — follows a mandatory sequential processing pipeline that includes authentication, AML screening, approval rules, and accounting synchronization before completion.
Key Processing Controls
- AML screening is mandatory — every transfer is checked against sanctions lists and risk rules before any funds move
- Approval Pool — flagged transactions enter an approval queue requiring authorized operator action before processing
- Atomic database transactions — debit and credit operations are wrapped in a single DB transaction; if any step fails, the entire operation rolls back
- Full audit trail — every step is logged with timestamps, user identifiers, and system states
- Accounting synchronization — confirmed transactions are automatically synced to Tiger 3 for official accounting records
Transfer Status Lifecycle (State Machine)
| # | Status | Description | Next Status |
|---|---|---|---|
| 1 | Entered | Transfer record created in system. AML screening in progress. Sender and beneficiary data captured. | Ready for Payment or Compliance Hold |
| 2 | Compliance Hold | Transfer flagged by AML/risk rules. Awaiting manual review and approval by Risk Officer in the Approval Pool. | Ready for Payment or Rejected |
| 3 | Ready for Payment | AML checks passed and (if required) compliance approval granted. Transfer is ready for settlement. Sender balance committed. | Paid |
| 4 | Paid | Funds dispatched to correspondent network (FAST/EFT) or international partner API. Settlement confirmed. Accounting entry created. | Completed |
| 5 | Completed | End-to-end transfer confirmed as complete. Recipient has received funds (confirmed by bank or correspondent partner callback). Final audit record written. | — Final State — |
| 6 | Refunded | Transfer cancelled after payment due to recipient error or request. Reversal entry created. Commission adjusted. Sender notified. | — Final State — |
3.2 — International Money Transfer Flow
Cross-border transfer processing — from initiation to payout
International money transfers are a core product of the Moneyout platform, governed directly by Law No. 6493 and subject to heightened AML and regulatory controls. Every cross-border transfer passes through additional compliance steps compared to domestic transfers.
3.3 — Wallet Operations Flow
Deposit, withdrawal, and wallet-to-wallet transfer processing
3.4 — POS Payment Flow
Card and digital payment processing at merchant / agent locations
POS payments are processed through Magicpay POS terminals (Android-based) deployed at merchant and agent representative locations. The terminal communicates exclusively with the Core Payment Engine — no direct card network access from the terminal itself.
3.5 — Customer Onboarding & KYC Flow
Identity verification and customer registration process
All customers must complete a Know Your Customer (KYC) process before transacting. Moneyout performs identity verification in compliance with TCMB and MASAK requirements, using biometric identity verification integrated with the Turkish ID infrastructure.
3.6 — AML & Compliance Workflow
How flagged transactions are handled and MASAK reporting is generated
The AML compliance workflow defines how the system responds to high-risk transactions, manages the approval pool, generates regulatory reports, and maintains the audit trail required by MASAK (Mali Suçları Araştırma Kurulu) and TCMB.
| Action | Trigger | Handled By | Outcome |
|---|---|---|---|
| Auto-Approve | Low risk score, no sanctions match | System (automatic) | Transaction processes immediately |
| Compliance Hold | 80%+ sanctions list match OR rule trigger | Risk Officer (Admin Dashboard) | Transaction held pending manual review |
| Auto-Block | 100% sanctions match OR blocked customer | System (automatic) | Transaction rejected; customer notified; event logged |
| STR Filing | Compliance officer determines suspicious activity | Compliance Unit | Suspicious Transaction Report filed with MASAK |
| SAR / CTR | Regulatory thresholds exceeded | Compliance Unit | Regulatory report generated and submitted to MASAK/TCMB |
4.1 — External Integration Architecture
All third-party system connections — method, protocol, and direction
Integration Summary Table
| # | System | Vendor | Method | Direction | Protocol | Trigger |
|---|---|---|---|---|---|---|
| 1 | Fineksus AML | Fineksus | REST API | Outbound | HTTPS / TLS 1.3 | Every financial transaction |
| 2 | FAST / EFT Network | Interbank | Secured API | Bidirectional | HTTPS / TLS 1.3 | Domestic transfer initiation / receipt |
| 3 | Paycell | Paycell A.Ş. | REST API | Outbound | HTTPS / TLS 1.3 | Bill payment request from wallet |
| 4 | Tiger 3 Accounting | Logo / Antsoft | Internal Sync | Outbound | Local network | Transaction confirmation |
| 5 | Magicpay POS | Magicpay | REST API | Bidirectional | HTTPS / TLS 1.3 | POS payment authorization |
| 6 | Firebase FCM | FCM API | Outbound | HTTPS / TLS 1.3 | Transaction events & alerts | |
| 7 | RIA Money Transfer | Euronet / RIA | REST API | Outbound | HTTPS / TLS 1.3 | International transfer routing |
| 8 | Korona Pay | Korona Pay Intl. | REST API | Outbound | HTTPS / TLS 1.3 | International transfer routing (CIS) |
| 9 | Aysar | Aysar Intl. | REST API | Outbound | HTTPS / TLS 1.3 | International transfer routing (Gulf) |
| 10 | Tranglo | Tranglo Sdn Bhd | REST API | Outbound | HTTPS / TLS 1.3 | International transfer routing (SEA) |
| 11 | Albaraka Bank | Albaraka Türk | Paygate API | Bidirectional | HTTPS / TLS 1.3 | EFT/FAST settlement |
| 12 | Vakif Bank | T. Vakıflar Bankası | Paygate API | Bidirectional | HTTPS / TLS 1.3 | EFT/FAST settlement |
| 13 | Finans Bank (QNB) | QNB Finansbank | Paygate API | Bidirectional | HTTPS / TLS 1.3 | EFT/FAST settlement |
4.2 — GIB Regulatory Reporting Architecture
Mandatory Turkish Tax Authority (Gelir İdaresi Başkanlığı) compliance reports generated by the platform
The platform generates five distinct GIB report types, each covering a different category of regulated financial activity. All reports are produced in GIB-specified XML/CSV format, validated against schema rules, and submitted via the GIB e-Beyanname portal or secure API channel.
GIB Report Inventory
| Report Code | Full Name | Transaction Type Code | Coverage | Frequency |
|---|---|---|---|---|
| UPTGI | Uluslararası Para Transferi Gönderilen | UP001 |
International money transfers — outgoing (sent from Turkey) | Monthly |
| UPTGE | Uluslararası Para Transferi Gelen | UP005 |
International money transfers — incoming (received into Turkey) | Monthly |
| YT | Yurt İçi Transfer | 00001 |
Domestic wallet-to-wallet money transfers | Monthly |
| EPKBB | Elektronik Para Kullanıcı Bakiye Bilgisi | EP002 |
Wallet customer balance snapshots at reporting period end | Monthly |
| EPHPYCNI | Elektronik Para Hesabına Para Yükleme / Çekme | Deposit: OH011 / Withdrawal: OH010 |
Wallet deposit and withdrawal transactions | Monthly |
Report Generation Architecture
Data Fields by Report Type
| Report | Key Data Fields | Identity Required |
|---|---|---|
| UPTGI (Outgoing Intl.) |
Transaction date, amount (original currency + TRY equivalent), TCMB exchange rate, sender identity (TCKN/passport, nationality, address), beneficiary name & country, correspondent partner name, payout method | Sender: TCKN or Passport Beneficiary: name + country |
| UPTGE (Incoming Intl.) |
Transaction date, amount (original currency + TRY equivalent), source country, receiver identity (TCKN/passport, nationality), correspondent partner reference | Receiver: TCKN or Passport |
| YT (Domestic W2W) |
Transaction date, amount (TRY), sender wallet ID + identity, receiver wallet ID + identity, transaction reference number | Both sender & receiver: TCKN |
| EPKBB (Wallet Balances) |
Reporting period end date, wallet customer identity (TCKN/passport), wallet account balance (TRY), account status (active/blocked) | Account holder: TCKN or Passport |
| EPHPYCNI (Deposits/Withdrawals) |
Transaction date, operation type (deposit OH011 / withdrawal OH010), amount (TRY), wallet customer identity, source/destination (bank IBAN or card masked), transaction reference | Wallet customer: TCKN or Passport |
5.1 — Security Architecture Overview
Defense-in-depth — six security layers from perimeter to data
Moneyout applies a defense-in-depth security model with six distinct layers. A threat must bypass all layers to reach sensitive data. Each layer operates independently so the failure of one does not compromise the others.
5.2 — Authentication & Access Control Model
How users and systems are authenticated and authorized
| User / System Type | Authentication Method | Authorization | Additional Controls |
|---|---|---|---|
| Mobile Wallet customers | Username + Password → Sanctum Token + Biometric unlock (Face ID / Fingerprint) | Account-level: can only access own wallet data | NFC ID verification for onboarding; FCM device registration |
| Admin Dashboard users | Username + Password → Sanctum Token | Role-based (Admin / Operator / Teller / Risk Officer / Accountant etc.) | IP Allowlist (Checkip) · Working hours restriction (Checkworktime) |
| POS Terminal | Device-level API credentials → Sanctum Token | Merchant-scoped — can only process transactions for registered terminal | IP restriction · Device registration |
| Internal staff (VPN/AD) | Active Directory credentials + MFA (OTP + certificate) | AD Group Policy — role-based server and system access | Must connect via SSL VPN — no direct access without VPN |
| External APIs | API key / Shared secret | System-level — specific API endpoints only | IP allowlisting · TLS mutual authentication where applicable |
Admin Role Matrix
| Role | Access Scope |
|---|---|
| Admin | Full system access — all modules, all configuration |
| SuperOperator | Full operations access — transfers, wallets, POS — no system configuration |
| Operator | Operational access — transaction processing and monitoring |
| Teller | Counter-level operations — customer service, transaction initiation |
| Agent | Agent branch operations — limited to assigned agent scope |
| Risk Officer | Compliance dashboard — AML alerts, approval pool, risk monitoring |
| Accountant | Financial reports, accounting entries, reconciliation |
| Internal Control | Read-only audit access — all modules, no transaction initiation |
Security Policy Parameters
| Control | Parameter | Applies To |
|---|---|---|
| API Token Lifetime | 3 hours (configurable) | All authenticated sessions (Admin Dashboard, Mobile Wallet, POS) |
| Token Revocation | Immediate on logout | Sanctum token invalidated server-side on logout |
| Password Lockout | After 5 consecutive failed attempts | Admin Dashboard users — account locked; requires admin unlock or password reset |
| PIN Lockout | After 3 consecutive failed attempts | Wallet customers — PIN locked; requires OTP-based reset via SMS/email |
| Password Policy | Minimum 6 characters · Letters + Numbers + Special characters required | All platform users (Admin, Operator, Teller, Agent) |
| OTP Validity | Time-limited (single use) | Sensitive operations: PIN reset, password reset, high-value transaction confirmation |
| Session Binding | Token bound to device & IP at issuance | Enforced by Checkip middleware — token cannot be used from a different IP without re-authentication |
| Working Hours Enforcement | Checkworktime middleware active on all Admin/Teller/Agent APIs | API requests outside configured business hours are rejected with HTTP 403 |
5.3 — Encryption Model
Data-at-rest and data-in-transit encryption standards
| Scope | Standard | Applied To |
|---|---|---|
| Data at Rest | AES-256 | All database contents on MS SQL Server 2022; backup files; sensitive fields (identity documents, card data) |
| Data in Transit | TLS 1.3 | All client-to-API communication; all API-to-external-service communication; VPN tunnel encryption |
| Key Management | HSM | Hardware Security Module for cryptographic key storage — keys never exist in plaintext software memory |
| Password Storage | bcrypt | All user passwords hashed with bcrypt — never stored in plaintext or reversible form |
| API Tokens | SHA-256 Hash | Laravel Sanctum tokens stored as SHA-256 hashes — raw token shown to user only once at issuance |
| Backup Encryption | AES-256 | All cloud backups (Turkcell Dijital) are encrypted before transmission and storage |
6.1 — Deployment & Infrastructure Architecture
Cloud hosting, containerization, DR strategy, and backup model
- All in-house applications hosted here (Core API, Admin Dashboard, Wallet backend, Help Center, Orchestra, VDR)
- Ubuntu Server (Linux) virtual machines on Turkcell Cloud infrastructure
- Docker containerization for consistent, reproducible deployments
- MS SQL Server 2022 + MySQL + Redis on dedicated VMs
- Fortinet Firewall protecting all inbound/outbound traffic
- SIEM monitoring all security events in real time
- Daily backups shipped to Turkcell Cloud Backup (Ankara)
- Mirror of all production systems and databases
- Activated in case of production failure, cyber attack, or physical disaster
- Database replicated from Tekirdağ — point-in-time recovery capability
- Tested periodically to confirm recovery time objectives (RTO) are met
- Separate physical location ensures geographic redundancy
- All backups from Turkcell Cloud Backup Service stored here
| Containerization | Docker — all application components run as containers. Ensures environment consistency. Simplifies deployment and rollback. |
| Process Management | Supervisor — manages and auto-restarts Laravel queue workers and background processes after any failure without manual intervention. |
| Scheduled Tasks | CronJobs on Ubuntu Server — daily settlement, reconciliation, report generation, balance checks, and compliance reporting. |
| Operating System | Ubuntu Server (Linux) for all in-house apps. Windows Server for Active Directory and Tiger 3 accounting only. |
| Backup | Daily backups via Turkcell Dijital İş Servisleri A.Ş. — encrypted, stored independently, available for point-in-time restoration. |
6.2 — Database Architecture
Data store design, responsibilities, and data partitioning
| Data Store | Type | Role | What Is Stored | DR / Backup |
|---|---|---|---|---|
| MS SQL Server 2022 | Relational RDBMS | Primary | All core transactional data: customer profiles, wallet accounts, transaction records, KYC data, compliance events, accounting entries, agent data, commission records, system configuration | Replicated to Ankara DR · Daily backup via Turkcell Cloud Backup |
| MySQL | Relational RDBMS | Secondary | Analytics and reporting data — aggregated transaction statistics, performance metrics, BI-ready datasets. Offloads analytical queries from primary DB. | Backed up via Turkcell Cloud Backup |
| Redis | In-memory / Key-Value | Supporting | Session caching, Laravel job queues, rate limit counters, real-time state for WebSocket, temporary OTP codes | Ephemeral — recoverable from primary DB on restart |
7.1 — Audit Logging & Data Retention Architecture
Log management, data retention periods, and regulatory compliance
Audit Log Architecture
Every transaction, user action, system event, and security event generates an immutable audit log entry. Logs are written to MS SQL Server with a timestamp, user/system identifier, action type, before/after state, and source IP. Log entries cannot be deleted or modified by application users.
| Log Type | What Is Logged | Storage | Retention |
|---|---|---|---|
| Transaction Logs | All financial transactions: transfers, wallet operations, POS payments. Full detail: amount, currency, parties, status, timestamps, reference numbers, AML score. | MS SQL Server 2022 (primary) + Turkcell Cloud Backup | Minimum 10 years (exceeds 5-year MASAK/TCMB requirement) |
| AML / Compliance Logs | All AML screening results, risk scores, compliance holds, approval/rejection decisions, STR filings | MS SQL Server 2022 + Turkcell Cloud Backup | Minimum 10 years per MASAK Law No. 5549 |
| User Action Logs | All Admin Dashboard and API actions: login/logout, data access, configuration changes, approval pool actions, with user ID and IP | MS SQL Server 2022 | 5 years minimum |
| System & Security Logs | Authentication events, failed logins, IP denials, rate limit breaches, system errors, infrastructure events | SIEM (Crypttech/Arrtech) + MS SQL Server | 2 years minimum (SIEM) + longer in DB |
| KYC & Identity Logs | Customer onboarding records, NFC verification results, biometric match scores, TCKN validation results | MS SQL Server 2022 (encrypted) + Turkcell Cloud Backup | Lifetime of customer relationship + 10 years |
| API Access Logs | All inbound API requests: endpoint, method, response code, latency, source IP, token reference | Application server logs + SIEM | 1 year (operational) + aggregated in DB |
Log Integrity & Tamper Protection
- All audit logs are written with timestamps and sequence numbers — gaps or out-of-order entries are automatically flagged
- SIEM collects logs from all sources independently — even if the application database were compromised, SIEM retains an independent copy
- Database-level audit logs use append-only write patterns — no UPDATE or DELETE operations are permitted on audit tables
- Daily backups of all log data are transmitted to Turkcell Dijital Cloud Backup — geographically separate from production
- Log access is restricted to Compliance Officers, Internal Control, and Admins — all log access is itself logged
7.2 — Technology Stack Reference
Complete inventory of all technologies, frameworks, and versions in use
In-House Application Technologies
| Component | Technology | Purpose |
|---|---|---|
| Core Payment Engine | Laravel 10 (PHP) · REST API · WebSocket · Laravel Sanctum · Laravel Queues | Central backend — all payment business logic |
| Admin Dashboard | Angular 18 · TypeScript · NgRx · Angular Material · ngx-translate | Operations and management web application |
| Mobile Wallet | React Native Expo · TypeScript · Firebase FCM · NFC module | Customer-facing iOS & Android app |
Infrastructure & Data Technologies
| Technology | Type | Role |
|---|---|---|
Microsoft SQL Server 2022 | Relational RDBMS | Primary transactional database for all core operations |
MySQL | Relational RDBMS | Analytics and reporting secondary database |
Redis | In-memory Key-Value Store | Caching, session management, job queues |
Docker | Containerization | Application deployment containers |
Ubuntu Server (Linux) | Operating System | All in-house application server VMs |
Windows Server | Operating System | Active Directory and Tiger 3 accounting |
Supervisor | Process Manager | Laravel queue worker management |
CronJobs | Scheduler | Automated batch processing and reporting tasks |
Security & Infrastructure Technologies
| Technology | Vendor | Role |
|---|---|---|
| Fortinet NGFW & FortiClient VPN | Fortinet / Arrtech Teknoloji | Perimeter firewall, IDS/IPS, SSL VPN with MFA |
| SIEM — Crypttech | Arrtech Teknoloji | Security event monitoring, log aggregation, alerting |
| Microsoft Active Directory | Microsoft / Ldap Bilgi | Centralized IAM, RBAC, Group Policy |
| HSM (Hardware Security Module) | — | Cryptographic key management for AES-256 encryption |
| AES-256 | Standard | Data-at-rest encryption |
| TLS 1.3 | Standard | Data-in-transit encryption for all communications |
| Firebase FCM | Push notification delivery for mobile app |
Third-Party Service Technologies
| System | Vendor | Technology / Integration |
|---|---|---|
| AML / Compliance | Fineksus Bilişim | PayGate Inspector REST API · 59 active rules |
| Accounting ERP | Logo Software / Antsoft | Tiger 3 · SQL Server-based · Windows Server |
| POS Terminal Software | Magicpay Teknoloji | Android-based POS · REST API integration |
| Cloud Hosting | Superonline İletişim | Turkcell Virtual Data Center · Tekirdağ & Ankara |
| Cloud Backup | Turkcell Dijital | Software-based encrypted cloud backup · Daily |
| Bill Payment | Paycell Ödeme | Paycell REST API · Integrated into Wallet Engine |
Notes & Declaration
Compliance declaration and document information
Notes
- This document describes the architecture at a level appropriate for regulatory and audit review. Source code, internal algorithms, cryptographic keys, and specific security configurations are not disclosed.
- The architecture described reflects the current production state as of February 2026. Material architectural changes will be reported to the Compliance Unit and TCMB where required.
- All in-house applications are developed and maintained by Moneyout's internal Information Systems department (5 dedicated staff).
- Third-party integrations (Fineksus, Magicpay, Paycell, etc.) are governed by formal written service agreements. Vendor architecture and security is their responsibility under the respective contracts.
- The platform is subject to periodic internal security reviews and penetration testing as part of the ongoing compliance program.
Document Information
| Field | Value |
|---|---|
| Company | Moneyout Electronic Money and Payment Services Inc. |
| Company Code | 00917 |
| Tax No. | 622 175 8445 |
| Address | Eşentepe Mah. Büyükdere Cad. Metrocity No: 171 İç Kapı No: 15 Şişli/İstanbul, Turkey |
| Classification | Confidential — For Audit Use Only |
Confidential — For Audit Use Only · Moneyout Electronic Money and Payment Services Inc.