2019-04-21 06:54:56 +00:00
title : Possible DNS Tunneling
2019-11-12 22:12:27 +00:00
id : 1ec4b281-aa65-46a2-bdae-5fd830ed914e
2019-04-13 18:27:36 +00:00
status : experimental
2019-11-12 22:12:27 +00:00
description : Normally, DNS logs contain a limited amount of different dns queries for a single domain. This rule detects a high amount of queries for a single domain,
which can be an indicator that DNS is used to transfer data.
2019-04-13 18:27:36 +00:00
references :
- https://zeltser.com/c2-dns-tunneling/
2019-04-13 18:28:55 +00:00
- https://patrick-bareiss.com/detect-c2-traffic-over-dns-using-sigma/
2019-04-13 18:27:36 +00:00
author : Patrick Bareiss
date : 2019 /04/07
logsource :
2019-10-25 02:30:55 +00:00
category : dns
2019-04-13 18:27:36 +00:00
detection :
selection :
parent_domain : '*'
condition : selection | count(dns_query) by parent_domain > 1000
falsepositives :
- Valid software, which uses dns for transferring data
level : high
tags :
2019-10-25 02:30:55 +00:00
- attack.t1048
- attack.exfiltration