Rules: Possible Dynamic DNS Domain
This rule looks for DNS query/reply domains which appear to be associated with a dynamic DNS service.
Detail | Value |
---|---|
Type | Match |
Category | Command and Control |
Apply Risk to Entities | device_hostname, device_ip, srcDevice_hostname, srcDevice_ip, user_username |
Signal Name | Possible Dynamic DNS Domain |
Summary Expression | Possible dynamic DNS domain for URL: {{dns_queryDomain}} |
Score/Severity | Static: 1 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0011, _mitreAttackTechnique:T1568, _mitreAttackTechnique:T1568.001, _mitreAttackTechnique:T1568.002, _mitreAttackTechnique:T1568.003 |
- Amazon AWS - Application Load Balancer
- Amazon AWS - Route53
- Bro - Bro
- Cisco Systems - Umbrella
- Cloudflare - Logpush
- CrowdStrike - FDR
- Fortinet - Fortigate
- ISC - Bind
- Infoblox - Network Identity Operating System
- Microsoft - DNS
- Microsoft - Windows
- Sophos - UTM 9
- Zscaler - Firewall
Origin | Field |
---|---|
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | dns_queryDomain_alexaRank |
Normalized Schema | dns_queryDomain_possibleDynDns |
Normalized Schema | dns_replyDomain_alexaRank |
Normalized Schema | dns_replyDomain_possibleDynDns |
Normalized Schema | srcDevice_hostname |
Normalized Schema | srcDevice_ip |
Normalized Schema | user_username |