For stockpiled domains and DNS tunneling domains, including
tunneling-based APTs (advanced persistent threats), you can view the
various tools used in the attack, as well as the attack campaigns
associated with the domain. This is reflected in the Threat ID/Name
field for the log entry for a given domain. The Threat ID/Name for DNS
domains with attributions use the following format; in this example, for
DNS tunnel domains:
Tunneling:<tool_name>,<tool_name>,<tool_name>,...:<domain_name>,
whereby the
tool_name refers to the DNS tunneling tools
used to embed data into the DNS queries and responses, but also the
cyber threat campaign name, in a comma-separated list. These campaigns
can be industry accepted incidents and use the same naming conventions
or might be one identified and named by Palo Alto Networks and described
in the
Unit 42 Threat Research blogs. A blog of
such a campaign, in this case, one leveraging DNS tunneling techniques,
can be found here:
Leveraging DNS Tunneling for Tracking
and Scanning.
The associated tool and campaign attributions might take some
time after the initial detection has completed to become
viewable in the logs as well as the Palo Alto Networks
ThreatVault and Test-A-Site. When the attribution component
finishes and has been verified, the complete DNS tunneling tools
and campaign details display as expected in the Threat ID/Name
and campaign fields.