SigmaHQ/rules/network/net_dns_c2_detection.yml

20 lines
712 B
YAML
Raw Normal View History

2019-04-21 06:54:56 +00:00
title: Possible DNS Tunneling
status: experimental
2019-04-21 06:54:56 +00:00
description: Normally, DNS logs contain a limited amount of different dns queries for a single domain. This rule detects a high amount of queries for a single domain, which can be an indicator that DNS is used to transfer data.
references:
- https://zeltser.com/c2-dns-tunneling/
- https://patrick-bareiss.com/detect-c2-traffic-over-dns-using-sigma/
author: Patrick Bareiss
date: 2019/04/07
logsource:
product: dns
detection:
selection:
parent_domain: '*'
condition: selection | count(dns_query) by parent_domain > 1000
falsepositives:
- Valid software, which uses dns for transferring data
level: high
tags:
- attack.t1043