Skip to content

Latest commit

 

History

History
66 lines (57 loc) · 3.25 KB

MATCH-S00554.md

File metadata and controls

66 lines (57 loc) · 3.25 KB

Rules: Outbound IRC Traffic

Description

This rule detects outbound traffic over IRC, which could indicate a compromised host being used for command and control or exfiltration operations.

Additional Details

Detail Value
Type Templated Match
Category Command and Control
Apply Risk to Entities srcDevice_hostname, srcDevice_ip, user_username
Signal Name Outbound IRC Traffic
Summary Expression Outbound IRC traffic from IP: {{srcDevice_ip}} to IP: {{dstDevice_ip}}
Score/Severity Dynamic: 1 or 3
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0011, _mitreAttackTechnique:T1071, _mitreAttackTechnique:T1071.001

Vendors and Products

Dynamic Signal Score/Severity Translation

The default score of 1 is used as a catch all if none of the translations are met.

Schema Field Field Value Score/Severity
application irc 3

Fields Used

Origin Field
Normalized Schema application
Normalized Schema dstDevice_ip_isInternal
Normalized Schema dstPort
Normalized Schema listMatches
Normalized Schema srcDevice_hostname
Normalized Schema srcDevice_ip
Normalized Schema srcDevice_ip_isInternal
Normalized Schema user_username