Rules: Outbound IRC Traffic
This rule detects outbound traffic over IRC, which could indicate a compromised host being used for command and control or exfiltration operations.
Detail | Value |
---|---|
Type | Templated Match |
Category | Command and Control |
Apply Risk to Entities | srcDevice_hostname, srcDevice_ip, user_username |
Signal Name | Outbound IRC Traffic |
Summary Expression | Outbound IRC traffic from IP: {{srcDevice_ip}} to IP: {{dstDevice_ip}} |
Score/Severity | Dynamic: 1 or 3 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0011, _mitreAttackTechnique:T1071, _mitreAttackTechnique:T1071.001 |
- Amazon AWS - Network Firewall
- Amazon AWS - VpcFlowLogs
- Bro - Bro
- CheckPoint - Application Control
- CheckPoint - Firewall and VPN
- CheckPoint - SmartDefense
- CheckPoint - URL Filtering
- Cisco Systems - ASA
- Cisco Systems - Firepower
- Cisco Systems - Meraki
- Citrix - ADC
- CrowdStrike - FDR
- CrowdStrike - Falcon
- Dell - Firewall
- Forcepoint - Web Security
- Fortinet - Fortigate
- Google - Google Cloud Platform
- Juniper - SRX Series Firewall
- Microsoft - Azure
- Microsoft - Defender Advanced Hunting
- Microsoft - Windows
- OISF - Suricata IDS
- Palo Alto Networks - Next Generation Firewall
- Sophos - UTM 9
- WatchGuard - Fireware
- Zscaler - Firewall
- Zscaler - Nanolog Streaming Service
The default score of 1
is used as a catch all if none of the translations are met.
Schema Field | Field Value | Score/Severity |
---|---|---|
application | irc | 3 |
Origin | Field |
---|---|
Normalized Schema | application |
Normalized Schema | dstDevice_ip_isInternal |
Normalized Schema | dstPort |
Normalized Schema | listMatches |
Normalized Schema | srcDevice_hostname |
Normalized Schema | srcDevice_ip |
Normalized Schema | srcDevice_ip_isInternal |
Normalized Schema | user_username |