Skip to main content
Version: 2.10.1

Botnet Command and Control Traffic Monitor (10050 / 20050)

Description​

This Module monitors traffic originated from known Command and Control hosts (C&C) or directed to these hosts. The list of IP addresses of C&C hosts is obtained from the list published by Emerging Threats (http://www.emergingthreats.net/) company:

The Module reports all communications of internal hosts with C&C list, and provides consolidated information about these communications over a time interval. The observation interval (T, sec) is configurable.

Use External Data Feeder for NFO component for initial load and periodic updates of this threat list.

Please contact support@netflowlogic.com if you want to use your own feeds.

Parameters​

Parameter NameDescriptionComments
Enable(1) or disable (0) reporting flow denied eventsIf set to 1, enable reporting firewall denied flows. If set to 0, firewall denied flows are not reporteddefault = 1
Enable(1) or disable (0) heartbeat messagesIf set to 1, enable heartbeat messagesdefault = 0
Enable(1) or disable (0) reporting flow created and flow updated eventsIf set to 1, enable reporting firewall flow created and flow updated events. If set to 0, firewall flow created and flow updated events are not reporteddefault = 0
Data Collection Interval, secModule logic execution intervalmin = 10 sec, max = 300 sec, default = 30 sec
Known C&C hosts (ipv4_dst_addr) listList of C&C IPv4 addresses‘Shadowserver C&C list’ from Emerging Threats. This list is updated by External Data Feeder for NFO

Input​

NetFlow v5, v9, IPFIX, Cisco ASA NSEL, Palo Alto Networks NetFlow v9, sFlow.

Required NetFlow Fields​

Information Element (IE)IE idIE size, BDescription
sourceIPv4Address84The IPv4 source address in the IP packet header
destinationIPv4Address124The IPv4 destination address in the IP packet header
sourceTransportPort72The source port identifier in the transport header. For the transport protocols UDP, TCP, and SCTP, this is the source port number given in the respective header.
destinationTransportPort112The destination port identifier in the transport header. For the transport protocols UDP, TCP, and SCTP, this is the destination port number given in the respective header.
octetDeltaCount14 or 8The number of octets since the previous report (if any) in incoming packets for this Flow at the Observation Point. The number of octets includes IP header(s) and IP payload.

Syslog/JSON Message Fields​

KeyField DescriptionComments
nfc_idMessage type identifier"nfc_id=20050"
exp_ipNetFlow exporter IPv4 address<IPv4_address>
src_ipSource host IPV4 address<IPv4_address>
src_portSource port<number>
dest_ipDestination host IPv4 address<IPv4_address>
dest_portDestination port<number>
flow_countNumber of flows<number>
bytesBytes total (Traffic)<number>
min_bytesMinimum bytes count of flows<number>
max_bytesMaximum bytes count of flows<number>
directionFlow direction<string>: "ingress" or "egress"
t_intObservation time interval, msec<number>

Syslog/JSON Message Fields - Heartbeat​

KeyField DescriptionComments
nfc_idMessage type identifier"nfc_id=20050"
typeMessage type<string>: "heartbeat"
flow_countNumber of flows<number>
wl1_last_timeWatchlist 1 last update timestamp<timestamp>
t_intObservation time interval, msec<number>