A couple of comments. First, you don't say anything about your setup, like if
the DNS server is the one from which requests from your network go out to the
rest of the world. I ran a setup where we had internal DNS servers that
forwarded queries to DMZ-based DNS servers, and I only sniffed the traffic
between inside and the DMZ, between inside and outside, and between DMZ and
outside. I'd see responses like this, could trace the request to the inside
forwarder, but it stopped there because I was not sniffing traffic to the
internal DNS servers.
When I was doing this I did not have ELSA. I am not that good yet at using ELSA.
I'm sure you could construct queries that would show how the request started at
your DNS server but if you have a split-brain DNS setup like I did it's the
internal servers you need to do traces on. (BTW, ELSA is mostly a snazzy way of
looking through the Bro logs. Looking through them by hand works, too, just not
as fast.) Adding the capability of sniffing internal traffic to those servers
was a long-term goal of mine but it never happened, owing mainly to leaving the job.
Trying to correlate this alert with other sources could also be of help, like AV
logs, SIEM logs, firewall logs, and so on. But I don't have a "one query to rule
them all" solution for you.
--
Mit besten Grüßen
Shane Castle