It is (for now) possible to filter based on the "outer" domain name as transmitted in the TLS negotiation. In order to indicate to the server which certificate to use, the clients send the domain name as "server name indication" (SNI). This happens before the certificate is presented, so this information is in the clear. You can use Mikrotik RouterOS devices to filter based on the SNI domain name. See the
firewall documentation under "tls-host".
There are several caveats:
If the packet with the SNI is fragmented, the firewall rule is not triggered. Depending on your firewall style (default deny or default allow), this means some connections get through that shouldn't or some connections get blocked that should be allowed.
The SNI domain name isn't necessarily the same as the host which is requested by the host header inside the encrypted connection. This technique is called domain fronting and can be used to evade SNI based filtering.
An improvement on SNI, called ESNI, has been developed which also encrypts the SNI, rendering any attempt to passively learn the domain name moot.