I published an article on How to Leverage Log Services to Analyze C&C Traffic
on the Security Intelligence blog.
This article describes what can cause C2 traffic, the different types of C2 traffic and what log sources that you can use to detect the C2 traffic caused by malware.