Flow ID
stringlengths 32
44
| event_types
sequencelengths 0
472
| log_text
stringlengths 0
289k
| alerted
bool 2
classes | Label
stringclasses 4
values | truth
bool 2
classes | start
stringlengths 15
15
| age
int64 0
1,000k
| Day
stringclasses 10
values | event_type_alert
listlengths 0
25
| num_tokens
int64 0
138k
| __index_level_0__
int64 0
1.96M
|
---|---|---|---|---|---|---|---|---|---|---|---|
172.31.64.4-172.31.0.2-58200-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 636988, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 637002, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 637004, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:28.551856 | 45,636 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "152.101.118.11",
"port": 56017
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "152.101.118.11",
"dest_port": 56017,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-15T00:18:37.150279+0000"
},
"flow_id": 2109992104446727,
"http": null,
"metadata": {
"flowbits": [
"ms.rdp.synack"
]
},
"packet": "Aroyug5YArZrzmDACABFAAA7XT1AAIAGAACsH0IImGV2Cw092tGX4xEKRCesfFAY+dX8xQAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 637001,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-15T00:18:48.214915+0000",
"tx_id": null
}
] | 276 | 1,421 |
172.31.64.4-172.31.0.2-64883-53-17 | [
"flow",
"smb",
"smb"
] | event_type: flow, proto: TCP, app_proto: smb, flow_pkts_toserver: 7, flow_pkts_toclient: 5, flow_bytes_toserver: 667, flow_bytes_toclient: 454, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 625194, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_NEGOTIATE_PROTOCOL, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: PC NETWORK PROGRAM 1.0, smb_client_dialects_1: LANMAN1.0, smb_client_dialects_2: Windows for Workgroups 3.1a, smb_client_dialects_3: LM1.2X002, smb_client_dialects_4: LANMAN2.1, smb_client_dialects_5: NT LM 0.12, smb_server_guid: 36e049c0-6828-485e-0057-004f004b0052 ; pcap_cnt: 625197, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_SESSION_SETUP_ANDX, smb_status: STATUS_ACCESS_DENIED, smb_status_code: 0xc0000022, smb_session_id: 0, smb_tree_id: 0, smb_request_native_os: , smb_request_native_lm: , smb_response_native_os: , smb_response_native_lm: | false | BENIGN | false | 12:30:28.606821 | 159,226 | Wednesday-14-02-2018 | [] | 543 | 1,422 |
108.29.95.169-172.31.64.83-49441-3389-6 | [
"flow",
"dns",
"dns",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 156, flow_bytes_toclient: 372, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1000459, event_type: dns, proto: UDP, dns_type: query, dns_id: 11197, dns_rrname: wdcp.microsoft.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1000460, event_type: dns, proto: UDP, dns_type: query, dns_id: 11197, dns_rrname: wdcp.microsoft.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 1000461, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11197, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: wdcp.microsoft.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: wdcp.microsoft.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wdcp.microsoft.akadns.net, dns_answers_1_rrname: wdcp.microsoft.akadns.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: wdcpus.microsoft.akadns.net, dns_answers_2_rrname: wdcpus.microsoft.akadns.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 52.170.192.191, dns_answers_3_rrname: wdcpus.microsoft.akadns.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 52.224.179.205, dns_answers_4_rrname: wdcpus.microsoft.akadns.net, dns_answers_4_rrtype: A, dns_answers_4_ttl: 60, dns_answers_4_rdata: 40.71.103.4, dns_grouped_CNAME_0: wdcp.microsoft.akadns.net, dns_grouped_CNAME_1: wdcpus.microsoft.akadns.net, dns_grouped_A_0: 52.170.192.191, dns_grouped_A_1: 52.224.179.205, dns_grouped_A_2: 40.71.103.4 ; pcap_cnt: 1000462, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11197, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: wdcp.microsoft.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: wdcp.microsoft.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wdcp.microsoft.akadns.net, dns_answers_1_rrname: wdcp.microsoft.akadns.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: wdcpus.microsoft.akadns.net, dns_answers_2_rrname: wdcpus.microsoft.akadns.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 52.170.192.191, dns_answers_3_rrname: wdcpus.microsoft.akadns.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 52.224.179.205, dns_answers_4_rrname: wdcpus.microsoft.akadns.net, dns_answers_4_rrtype: A, dns_answers_4_ttl: 60, dns_answers_4_rdata: 40.71.103.4, dns_grouped_CNAME_0: wdcp.microsoft.akadns.net, dns_grouped_CNAME_1: wdcpus.microsoft.akadns.net, dns_grouped_A_0: 52.170.192.191, dns_grouped_A_1: 52.224.179.205, dns_grouped_A_2: 40.71.103.4 | false | BENIGN | false | 12:30:28.654141 | 368,879 | Wednesday-14-02-2018 | [] | 1,359 | 1,423 |
172.31.64.4-52.203.201.18-49759-443-6 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 88, flow_bytes_toclient: 104, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 603091, event_type: dns, proto: UDP, dns_type: query, dns_id: 24388, dns_rrname: j2global.widget.custhelp.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 603092, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24388, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: j2global.widget.custhelp.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: j2global.widget.custhelp.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 74.117.206.68, dns_grouped_A_0: 74.117.206.68 | false | BENIGN | false | 12:30:28.657097 | 436,772 | Wednesday-14-02-2018 | [] | 348 | 1,424 |
172.31.64.4-172.31.0.2-54424-53-17 | [
"dns",
"dns"
] | pcap_cnt: 633189, event_type: dns, proto: UDP, dns_type: query, dns_id: 12806, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 633190, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 12806, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e4518.x.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 9, dns_answers_0_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167 | null | BENIGN | false | 12:30:28.657867 | 309 | Wednesday-14-02-2018 | [] | 271 | 1,425 |
172.31.64.4-172.31.0.2-58897-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 79, flow_bytes_toclient: 132, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 622573, event_type: dns, proto: UDP, dns_type: query, dns_id: 41851, dns_rrname: c.msn.com.nsatc.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 622576, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 41851, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.msn.com.nsatc.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: nsatc.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: admin.nsatc.net, dns_authorities_0_soa_rname: dns.level3.net, dns_authorities_0_soa_serial: 1516051878, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 2700, dns_authorities_0_soa_expire: 3600000, dns_authorities_0_soa_minimum: 900 | false | BENIGN | false | 12:30:28.672809 | 10,978 | Wednesday-14-02-2018 | [] | 435 | 1,426 |
172.31.64.4-172.31.0.2-60634-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 628993, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 629008, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 629010, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:28.754965 | 88,994 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "212.92.116.6",
"port": 64915
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "212.92.116.6",
"dest_port": 64915,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 259,
"bytes_toserver": 314,
"pkts_toclient": 4,
"pkts_toserver": 4,
"start": "2018-02-14T22:06:06.435494+0000"
},
"flow_id": 2101320044422438,
"http": null,
"metadata": {
"flowbits": [
"ms.rdp.synack"
]
},
"packet": "Aroyug5YArZrzmDACABFAAA7MkxAAIAGAACsH0II1Fx0Bg09/ZM9YCQkXNfpUFAY+dU2uAAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 629007,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:06:17.114299+0000",
"tx_id": null
}
] | 276 | 1,427 |
172.31.64.4-172.31.0.2-49313-53-17 | [
"flow",
"tls"
] | event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 20, flow_pkts_toclient: 19, flow_bytes_toserver: 2910, flow_bytes_toclient: 1626, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: df, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: last_ack ; pcap_cnt: 612889, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: secure.livechatinc.com, tls_version: TLS 1.2 | false | BENIGN | false | 12:30:28.758439 | 13,746 | Wednesday-14-02-2018 | [] | 222 | 1,428 |
172.31.64.4-172.31.0.2-65043-53-17 | [
"flow",
"dhcp",
"dhcp"
] | event_type: flow, proto: UDP, app_proto: dhcp, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 357, flow_bytes_toclient: 344, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 630352, event_type: dhcp, proto: UDP, dhcp_type: request, dhcp_id: 567996229, dhcp_client_mac: 02:b6:6b:ce:60:c0, dhcp_assigned_ip: 0.0.0.0, dhcp_client_ip: 172.31.66.8, dhcp_dhcp_type: request, dhcp_client_id: 02:b6:6b:ce:60:c0, dhcp_hostname: EC2AMAZ-O4EL3NG, dhcp_params_0: subnet_mask, dhcp_params_1: router, dhcp_params_2: dns_server, dhcp_params_3: domain ; pcap_cnt: 630353, event_type: dhcp, proto: UDP, dhcp_type: reply, dhcp_id: 567996229, dhcp_client_mac: 02:b6:6b:ce:60:c0, dhcp_assigned_ip: 172.31.66.8, dhcp_client_ip: 172.31.66.8, dhcp_relay_ip: 0.0.0.0, dhcp_next_server_ip: 0.0.0.0, dhcp_dhcp_type: ack, dhcp_lease_time: 3600, dhcp_subnet_mask: 255.255.255.128, dhcp_routers_0: 172.31.66.1, dhcp_dns_servers_0: 172.31.0.2 | false | BENIGN | false | 12:30:28.758878 | 14,829 | Wednesday-14-02-2018 | [] | 455 | 1,429 |
172.31.64.29-172.31.0.2-63334-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 80, flow_bytes_toclient: 176, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2607719, event_type: dns, proto: UDP, dns_type: query, dns_id: 15941, dns_rrname: clients.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2607720, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15941, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: clients.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: clients.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 209.85.203.138, dns_answers_1_rrname: clients.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 209.85.203.139, dns_answers_2_rrname: clients.l.google.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 209.85.203.100, dns_answers_3_rrname: clients.l.google.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 209.85.203.101, dns_answers_4_rrname: clients.l.google.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 60, dns_answers_4_rdata: 209.85.203.102, dns_answers_5_rrname: clients.l.google.com, dns_answers_5_rrtype: A, dns_answers_5_ttl: 60, dns_answers_5_rdata: 209.85.203.113, dns_grouped_A_0: 209.85.203.138, dns_grouped_A_1: 209.85.203.139, dns_grouped_A_2: 209.85.203.100, dns_grouped_A_3: 209.85.203.101, dns_grouped_A_4: 209.85.203.102, dns_grouped_A_5: 209.85.203.113 | false | BENIGN | false | 12:30:28.780336 | 13,163 | Wednesday-14-02-2018 | [] | 766 | 1,430 |
172.31.64.4-172.31.0.2-63227-53-17 | [
"flow",
"tls"
] | event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 1074, flow_bytes_toclient: 3821, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: df, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: last_ack ; pcap_cnt: 617939, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.doubleclick.net, tls_issuerdn: C=US, O=Google Trust Services, CN=Google Internet Authority G3, tls_serial: 72:27:E5:30:75:56:44:C2, tls_fingerprint: dc:e5:73:e2:19:38:26:38:64:91:ff:fb:93:41:a4:9d:8d:ac:4b:2c, tls_sni: 2326416.fls.doubleclick.net, tls_version: TLS 1.2, tls_notbefore: 2018-01-30T09:27:12, tls_notafter: 2018-04-24T08:31:00 | false | BENIGN | false | 12:30:28.791883 | 559 | Wednesday-14-02-2018 | [] | 385 | 1,431 |
172.31.64.29-172.31.0.2-61054-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 76, flow_bytes_toclient: 284, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2608918, event_type: dns, proto: UDP, dns_type: query, dns_id: 50539, dns_rrname: match.adsrvr.org, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2608919, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50539, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: match.adsrvr.org, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: match.adsrvr.org, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_1_rrname: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 13, dns_answers_1_rdata: 23.21.198.56, dns_answers_2_rrname: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 13, dns_answers_2_rdata: 23.21.242.228, dns_answers_3_rrname: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 13, dns_answers_3_rdata: 23.21.254.95, dns_answers_4_rrname: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 13, dns_answers_4_rdata: 23.21.41.167, dns_answers_5_rrname: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_5_rrtype: A, dns_answers_5_ttl: 13, dns_answers_5_rdata: 23.21.56.63, dns_answers_6_rrname: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_6_rrtype: A, dns_answers_6_ttl: 13, dns_answers_6_rdata: 23.21.61.180, dns_answers_7_rrname: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_7_rrtype: A, dns_answers_7_ttl: 13, dns_answers_7_rdata: 23.21.89.242, dns_answers_8_rrname: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_answers_8_rrtype: A, dns_answers_8_ttl: 13, dns_answers_8_rdata: 23.21.192.235, dns_grouped_CNAME_0: ttd-useast-match-adsrvr-org-1999903436.us-east-1.elb.amazonaws.com, dns_grouped_A_0: 23.21.198.56, dns_grouped_A_1: 23.21.242.228, dns_grouped_A_2: 23.21.254.95, dns_grouped_A_3: 23.21.41.167, dns_grouped_A_4: 23.21.56.63, dns_grouped_A_5: 23.21.61.180, dns_grouped_A_6: 23.21.89.242, dns_grouped_A_7: 23.21.192.235 | false | BENIGN | false | 12:30:28.794402 | 377 | Wednesday-14-02-2018 | [] | 1,276 | 1,432 |
172.31.64.4-172.31.0.2-64727-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 630690, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 630698, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 630700, event_type: rdp, proto: TCP, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:28.797121 | 1,360 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "77.243.191.27",
"port": 63469
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "77.243.191.27",
"dest_port": 63469,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-14T22:39:28.792110+0000"
},
"flow_id": 1601282903119406,
"http": null,
"metadata": null,
"packet": "Aroyug5YArZrzmDACABFAgA7KgtAAIAGAACsH0IITfO/Gw099+0CABbAv2ItOFAY+dX7YwAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 630697,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:39:39.735588+0000",
"tx_id": null
}
] | 228 | 1,433 |
172.31.64.4-172.31.0.2-60128-53-17 | [
"flow",
"tls"
] | event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 1074, flow_bytes_toclient: 3821, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: df, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: last_ack ; pcap_cnt: 617943, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.doubleclick.net, tls_issuerdn: C=US, O=Google Trust Services, CN=Google Internet Authority G3, tls_serial: 72:27:E5:30:75:56:44:C2, tls_fingerprint: dc:e5:73:e2:19:38:26:38:64:91:ff:fb:93:41:a4:9d:8d:ac:4b:2c, tls_sni: 2326416.fls.doubleclick.net, tls_version: TLS 1.2, tls_notbefore: 2018-01-30T09:27:12, tls_notafter: 2018-04-24T08:31:00 | false | BENIGN | false | 12:30:28.815296 | 1,323 | Wednesday-14-02-2018 | [] | 385 | 1,434 |
172.31.64.4-172.31.0.2-65211-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 181, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 621600, event_type: dns, proto: UDP, dns_type: query, dns_id: 41085, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 621601, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 41085, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure.livechatinc.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 23, dns_answers_0_rdata: secure.livechatinc.com.edgekey.net, dns_answers_1_rrname: secure.livechatinc.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 23, dns_answers_1_rdata: e2201.ksd.akamaiedge.net, dns_answers_2_rrname: e2201.ksd.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 0, dns_answers_2_rdata: 23.218.62.30, dns_grouped_CNAME_0: secure.livechatinc.com.edgekey.net, dns_grouped_CNAME_1: e2201.ksd.akamaiedge.net, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:28.817440 | 306 | Wednesday-14-02-2018 | [] | 544 | 1,435 |
172.31.64.4-172.31.0.2-51448-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 629552, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 629558, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 629560, event_type: rdp, proto: TCP, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:28.822277 | 1,194 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "201.174.154.14",
"port": 61817
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "201.174.154.14",
"dest_port": 61817,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-14T22:13:32.167935+0000"
},
"flow_id": 1668481859489791,
"http": null,
"metadata": null,
"packet": "Aroyug5YArZrzmDACABFAgA7MyNAAIAGAACsH0IIya6aDg098Xk2Y2vmgI3P/lAY+dVSEgAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 629557,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:13:43.063688+0000",
"tx_id": null
}
] | 231 | 1,436 |
172.31.67.117-13.89.185.175-49672-443-6 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 167, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3220723, event_type: dns, proto: UDP, dns_type: query, dns_id: 47708, dns_rrname: shavar.prod.mozaws.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3220724, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47708, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: shavar.prod.mozaws.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: prod.mozaws.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns-1260.awsdns-29.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400 | false | BENIGN | false | 12:30:28.844453 | 71,665 | Wednesday-14-02-2018 | [] | 443 | 1,437 |
172.31.64.4-34.237.234.255-49762-80-6 | [
"dns",
"dns"
] | pcap_cnt: 631739, event_type: dns, proto: UDP, dns_type: query, dns_id: 47998, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 631740, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47998, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e4518.x.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 10, dns_answers_0_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167 | null | BENIGN | false | 12:30:28.845560 | 196,011 | Wednesday-14-02-2018 | [] | 271 | 1,438 |
172.31.64.4-172.31.0.2-55299-53-17 | [
"tls"
] | pcap_cnt: 628288, event_type: tls, proto: TCP, tls_subject: CN=faxfx.net, tls_issuerdn: C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3, tls_serial: 03:C0:A7:83:A2:6E:46:3F:18:47:A3:99:FE:75:55:EF:5B:36, tls_fingerprint: d1:2f:23:84:b3:f1:d3:5e:fb:b5:7c:ef:bb:df:45:b8:a6:fd:3a:5f, tls_sni: www.faxfx.net, tls_version: TLS 1.2, tls_notbefore: 2018-02-14T12:19:06, tls_notafter: 2018-05-15T12:19:06 | null | BENIGN | false | 12:30:28.849589 | 15,164 | Wednesday-14-02-2018 | [] | 225 | 1,439 |
172.31.64.4-172.31.0.2-62967-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 181, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 623973, event_type: dns, proto: UDP, dns_type: query, dns_id: 62258, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 623974, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 62258, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure.livechatinc.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 37, dns_answers_0_rdata: secure.livechatinc.com.edgekey.net, dns_answers_1_rrname: secure.livechatinc.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 37, dns_answers_1_rdata: e2201.ksd.akamaiedge.net, dns_answers_2_rrname: e2201.ksd.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 11, dns_answers_2_rdata: 23.218.62.30, dns_grouped_CNAME_0: secure.livechatinc.com.edgekey.net, dns_grouped_CNAME_1: e2201.ksd.akamaiedge.net, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:28.853201 | 14,505 | Wednesday-14-02-2018 | [] | 545 | 1,440 |
172.31.64.4-172.31.0.2-63192-53-17 | [
"dns",
"dns"
] | pcap_cnt: 631490, event_type: dns, proto: UDP, dns_type: query, dns_id: 18579, dns_rrname: shavar.services.mozilla.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 631491, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18579, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: shavar.services.mozilla.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: shavar.services.mozilla.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 57, dns_answers_0_rdata: shavar.prod.mozaws.net, dns_answers_1_rrname: shavar.prod.mozaws.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 57, dns_answers_1_rdata: 52.37.48.84, dns_answers_2_rrname: shavar.prod.mozaws.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 57, dns_answers_2_rdata: 52.43.54.37, dns_answers_3_rrname: shavar.prod.mozaws.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 57, dns_answers_3_rdata: 54.191.37.101, dns_answers_4_rrname: shavar.prod.mozaws.net, dns_answers_4_rrtype: A, dns_answers_4_ttl: 57, dns_answers_4_rdata: 34.211.140.227, dns_answers_5_rrname: shavar.prod.mozaws.net, dns_answers_5_rrtype: A, dns_answers_5_ttl: 57, dns_answers_5_rdata: 35.165.158.113, dns_answers_6_rrname: shavar.prod.mozaws.net, dns_answers_6_rrtype: A, dns_answers_6_ttl: 57, dns_answers_6_rdata: 52.25.10.191, dns_grouped_CNAME_0: shavar.prod.mozaws.net, dns_grouped_A_0: 52.37.48.84, dns_grouped_A_1: 52.43.54.37, dns_grouped_A_2: 54.191.37.101, dns_grouped_A_3: 34.211.140.227, dns_grouped_A_4: 35.165.158.113, dns_grouped_A_5: 52.25.10.191 | null | BENIGN | false | 12:30:28.867686 | 348 | Wednesday-14-02-2018 | [] | 823 | 1,441 |
172.31.64.4-172.31.0.2-62164-53-17 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 631734, event_type: dns, proto: UDP, dns_type: query, dns_id: 12245, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 631735, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 12245, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 10, dns_answers_2_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net ; pcap_cnt: 631736, event_type: dns, proto: UDP, dns_type: query, dns_id: 12245, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 631737, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 12245, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 10, dns_answers_2_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net | null | BENIGN | false | 12:30:28.875837 | 1,286 | Wednesday-14-02-2018 | [] | 943 | 1,443 |
172.31.64.4-172.31.0.2-56438-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 100, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 614678, event_type: dns, proto: UDP, dns_type: query, dns_id: 10461, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 614679, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 10461, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e2201.ksd.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 11, dns_answers_0_rdata: 23.218.62.30, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:28.876136 | 17,323 | Wednesday-14-02-2018 | [] | 354 | 1,444 |
172.31.64.4-34.237.234.255-49763-80-6 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 636695, event_type: dns, proto: UDP, dns_type: query, dns_id: 61337, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 636696, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61337, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 19, dns_answers_2_rdata: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net, dns_grouped_A_0: 23.13.154.167 ; pcap_cnt: 636697, event_type: dns, proto: UDP, dns_type: query, dns_id: 61337, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 636698, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61337, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 19, dns_answers_2_rdata: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net, dns_grouped_A_0: 23.13.154.167 | null | BENIGN | false | 12:30:28.896505 | 145,171 | Wednesday-14-02-2018 | [] | 947 | 1,445 |
172.31.64.4-172.31.0.2-64751-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 628018, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 628028, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 628030, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:28.907881 | 3,427 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "175.195.219.31",
"port": 56970
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "175.195.219.31",
"dest_port": 56970,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-14T21:55:14.882320+0000"
},
"flow_id": 896268142540432,
"http": null,
"metadata": {
"flowbits": [
"ms.rdp.synack"
]
},
"packet": "Aroyug5YArZrzmDACABFAAA7ENdAAIAGAACsH0IIr8PbHw093opWaid9JD/HY1AY+dV5OAAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 628027,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T21:55:24.779056+0000",
"tx_id": null
}
] | 276 | 1,446 |
172.31.64.4-172.82.206.16-49764-80-6 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 181, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 623281, event_type: dns, proto: UDP, dns_type: query, dns_id: 51706, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 623282, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 51706, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure.livechatinc.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 30, dns_answers_0_rdata: secure.livechatinc.com.edgekey.net, dns_answers_1_rrname: secure.livechatinc.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e2201.ksd.akamaiedge.net, dns_answers_2_rrname: e2201.ksd.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 18, dns_answers_2_rdata: 23.218.62.30, dns_grouped_A_0: 23.218.62.30, dns_grouped_CNAME_0: secure.livechatinc.com.edgekey.net, dns_grouped_CNAME_1: e2201.ksd.akamaiedge.net | false | BENIGN | false | 12:30:28.911722 | 124,364 | Wednesday-14-02-2018 | [] | 547 | 1,447 |
172.31.64.4-172.31.0.2-59779-53-17 | [
"rdp"
] | pcap_cnt: 633790, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:28.912232 | 311 | Wednesday-14-02-2018 | [] | 62 | 1,448 |
172.31.64.4-172.31.0.2-58659-53-17 | [
"tls"
] | pcap_cnt: 628842, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: www.faxfx.net, tls_version: TLS 1.2 | null | BENIGN | false | 12:30:28.915729 | 18,446 | Wednesday-14-02-2018 | [] | 53 | 1,449 |
172.31.64.4-23.196.107.60-49765-443-6 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 633637, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 633645, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 633647, event_type: rdp, proto: TCP, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:28.970573 | 684,848 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "201.174.154.14",
"port": 58924
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "201.174.154.14",
"dest_port": 58924,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-14T23:15:04.993872+0000"
},
"flow_id": 1760540430445136,
"http": null,
"metadata": null,
"packet": "Aroyug5YArZrzmDACABFAgA7Mz1AAIAGAACsH0IIya6aDg095iw922kO2H+kdFAY+dVSEgAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 633643,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T23:15:19.910796+0000",
"tx_id": null
}
] | 231 | 1,450 |
172.31.64.4-52.85.112.107-49766-80-6 | [
"dns",
"dns"
] | pcap_cnt: 634952, event_type: dns, proto: UDP, dns_type: query, dns_id: 43685, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 634954, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43685, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 20, dns_answers_2_rdata: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net, dns_grouped_A_0: 23.13.154.167 | null | BENIGN | false | 12:30:28.970675 | 409,822 | Wednesday-14-02-2018 | [] | 471 | 1,451 |
172.31.64.4-52.85.101.158-49767-443-6 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 631372, event_type: dns, proto: UDP, dns_type: query, dns_id: 31, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 631373, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 7, dns_answers_2_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net ; pcap_cnt: 631374, event_type: dns, proto: UDP, dns_type: query, dns_id: 31, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 631375, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 7, dns_answers_2_rdata: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net, dns_grouped_A_0: 23.13.154.167 | null | BENIGN | false | 12:30:28.970816 | 522,649 | Wednesday-14-02-2018 | [] | 939 | 1,452 |
172.31.64.4-209.85.203.97-49768-443-6 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 181, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 624461, event_type: dns, proto: UDP, dns_type: query, dns_id: 6399, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 624462, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 6399, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure.livechatinc.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: secure.livechatinc.com.edgekey.net, dns_answers_1_rrname: secure.livechatinc.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e2201.ksd.akamaiedge.net, dns_answers_2_rrname: e2201.ksd.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 0, dns_answers_2_rdata: 23.218.62.30, dns_grouped_CNAME_0: secure.livechatinc.com.edgekey.net, dns_grouped_CNAME_1: e2201.ksd.akamaiedge.net, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:28.970937 | 602,822 | Wednesday-14-02-2018 | [] | 545 | 1,453 |
172.31.64.4-172.31.0.2-61548-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 100, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 622881, event_type: dns, proto: UDP, dns_type: query, dns_id: 59782, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 622883, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59782, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e2201.ksd.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 19, dns_answers_0_rdata: 23.218.62.30, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:29.083804 | 49,783 | Wednesday-14-02-2018 | [] | 355 | 1,454 |
172.31.69.12-172.31.0.2-54380-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 197, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 261856, event_type: dns, proto: UDP, dns_type: query, dns_id: 38100, dns_rrname: detectportal.firefox.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 261857, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38100, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: detectportal.firefox.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: detectportal.firefox.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 46, dns_answers_0_rdata: detectportal.firefox.com.edgesuite.net, dns_answers_1_rrname: detectportal.firefox.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: a1089.d.akamai.net, dns_answers_2_rrname: a1089.d.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 3, dns_answers_2_rdata: 23.219.88.199, dns_answers_3_rrname: a1089.d.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 3, dns_answers_3_rdata: 23.219.88.169, dns_grouped_A_0: 23.219.88.199, dns_grouped_A_1: 23.219.88.169, dns_grouped_CNAME_0: detectportal.firefox.com.edgesuite.net, dns_grouped_CNAME_1: a1089.d.akamai.net | false | BENIGN | false | 12:30:29.084578 | 1,431 | Wednesday-14-02-2018 | [] | 641 | 1,455 |
172.31.64.4-172.31.0.2-56513-53-17 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 633725, event_type: dns, proto: UDP, dns_type: query, dns_id: 57541, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 633726, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57541, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 11, dns_answers_2_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net ; pcap_cnt: 633727, event_type: dns, proto: UDP, dns_type: query, dns_id: 57541, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 633728, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57541, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 11, dns_answers_2_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net | null | BENIGN | false | 12:30:29.086382 | 13,070 | Wednesday-14-02-2018 | [] | 947 | 1,456 |
172.31.69.12-172.31.0.2-60195-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 78, flow_bytes_toclient: 110, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 261858, event_type: dns, proto: UDP, dns_type: query, dns_id: 26082, dns_rrname: a1089.d.akamai.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 261859, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 26082, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a1089.d.akamai.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: a1089.d.akamai.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3, dns_answers_0_rdata: 23.219.88.169, dns_answers_1_rrname: a1089.d.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 3, dns_answers_1_rdata: 23.219.88.199, dns_grouped_A_0: 23.219.88.169, dns_grouped_A_1: 23.219.88.199 | false | BENIGN | false | 12:30:29.086734 | 465 | Wednesday-14-02-2018 | [] | 438 | 1,457 |
172.31.64.4-52.85.89.250-49769-443-6 | [
"rdp"
] | pcap_cnt: 637081, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:29.116873 | 376,706 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "77.243.191.23",
"port": 54418
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "77.243.191.23",
"dest_port": 54418,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 259,
"bytes_toserver": 314,
"pkts_toclient": 4,
"pkts_toserver": 4,
"start": "2018-02-15T00:21:54.692930+0000"
},
"flow_id": 442539784180418,
"http": null,
"metadata": null,
"packet": "Aroyug5YArZrzmDACABFAgA7N6lAAIAGAACsH0IITfO/Fw091JLVQPLmxvFLsFAY+dX7XwAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 637084,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-15T00:22:10.305204+0000",
"tx_id": null
}
] | 47 | 1,459 |
172.31.64.4-130.211.18.204-49770-80-6 | [
"rdp"
] | pcap_cnt: 630316, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:29.144423 | 234,767 | Wednesday-14-02-2018 | [] | 62 | 1,460 |
172.31.64.4-172.31.0.2-63495-53-17 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 626458, event_type: dns, proto: UDP, dns_type: query, dns_id: 21267, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 626459, event_type: dns, proto: UDP, dns_type: query, dns_id: 21267, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 626461, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21267, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: gstaticadssl.l.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2a00:1450:400b:0c00:0000:0000:0000:005e, dns_grouped_AAAA_0: 2a00:1450:400b:0c00:0000:0000:0000:005e ; pcap_cnt: 626462, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21267, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: gstaticadssl.l.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2a00:1450:400b:0c00:0000:0000:0000:005e, dns_grouped_AAAA_0: 2a00:1450:400b:0c00:0000:0000:0000:005e | null | BENIGN | false | 12:30:29.145516 | 437 | Wednesday-14-02-2018 | [] | 597 | 1,461 |
172.31.64.4-172.31.0.2-53349-53-17 | [
"flow",
"http",
"fileinfo",
"fileinfo",
"http",
"fileinfo",
"fileinfo",
"http",
"fileinfo",
"fileinfo"
] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 21, flow_pkts_toclient: 19, flow_bytes_toserver: 2453, flow_bytes_toclient: 3288, flow_age: 117, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 652528, event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463 ; pcap_cnt: 652528, event_type: fileinfo, proto: TCP, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463, app_proto: http, fileinfo_filename: /GTSGIAG3, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 75, fileinfo_tx_id: 0 ; pcap_cnt: 652631, event_type: fileinfo, proto: TCP, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463, app_proto: http, fileinfo_filename: /GTSGIAG3, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 463, fileinfo_tx_id: 0 ; pcap_cnt: 652758, event_type: http, proto: TCP, tx_id: 1, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463 ; pcap_cnt: 652758, event_type: fileinfo, proto: TCP, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463, app_proto: http, fileinfo_filename: /GTSGIAG3, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 75, fileinfo_tx_id: 1 ; pcap_cnt: 652943, event_type: fileinfo, proto: TCP, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463, app_proto: http, fileinfo_filename: /GTSGIAG3, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 463, fileinfo_tx_id: 1 ; pcap_cnt: 653011, event_type: http, proto: TCP, tx_id: 2, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463 ; pcap_cnt: 653011, event_type: fileinfo, proto: TCP, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463, app_proto: http, fileinfo_filename: /GTSGIAG3, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 75, fileinfo_tx_id: 2 ; pcap_cnt: 654006, event_type: fileinfo, proto: TCP, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463, app_proto: http, fileinfo_filename: /GTSGIAG3, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 463, fileinfo_tx_id: 2 | false | BENIGN | false | 12:30:29.150793 | 12,637 | Wednesday-14-02-2018 | [] | 1,777 | 1,462 |
172.31.64.4-172.31.0.2-49441-53-17 | [
"smb",
"smb"
] | pcap_cnt: 631358, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_NEGOTIATE_PROTOCOL, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: PC NETWORK PROGRAM 1.0, smb_client_dialects_1: LANMAN1.0, smb_client_dialects_2: Windows for Workgroups 3.1a, smb_client_dialects_3: LM1.2X002, smb_client_dialects_4: LANMAN2.1, smb_client_dialects_5: NT LM 0.12, smb_server_guid: 3d97cf50-2cb9-3569-0057-004f004b0052 ; pcap_cnt: 631360, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_SESSION_SETUP_ANDX, smb_status: STATUS_ACCESS_DENIED, smb_status_code: 0xc0000022, smb_session_id: 0, smb_tree_id: 0, smb_request_native_os: , smb_request_native_lm: , smb_response_native_os: , smb_response_native_lm: , metadata_flowbits_0: smb.tree.connect.ipc | null | BENIGN | false | 12:30:29.203768 | 1,308 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Generic Protocol Command Decode",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_09_23"
],
"cve": null,
"deployment": null,
"former_category": null,
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2010_09_23"
]
},
"rev": 9,
"severity": 3,
"signature": "GPL NETBIOS SMB-DS IPC$ unicode share access",
"signature_id": 2102466,
"source": null,
"target": null
},
"app_proto": "smb",
"dest_ip": "172.31.66.8",
"dest_port": 445,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 346,
"bytes_toserver": 655,
"pkts_toclient": 3,
"pkts_toserver": 5,
"start": "2018-02-14T22:53:20.112049+0000"
},
"flow_id": 1677372598302129,
"http": null,
"metadata": {
"flowbits": [
"smb.tree.connect.ipc"
]
},
"packet": "ArZrzmDAAroyug5YCABFAACId9RAAGsGcUSsOov1rB9CCPLCAb2bc0x2trWdTFAYQCWloQAAAAAAXP9TTUJ1AAAAABgHwAAAAAAAAAAAAAAAAAAA//4AAEAABP8AXAAIAAEAMQAAXABcADEAOQAyAC4AMQA2ADgALgA1ADYALgAyADAAXABJAFAAQwAkAAAAPz8/Pz8A",
"packet_info": {
"linktype": 1
},
"payload": "AAAAXP9TTUJ1AAAAABgHwAAAAAAAAAAAAAAAAAAA//4AAEAABP8AXAAIAAEAMQAAXABcADEAOQAyAC4AMQA2ADgALgA1ADYALgAyADAAXABJAFAAQwAkAAAAPz8/Pz8A",
"payload_printable": "...\\.SMBu.........................@....\\.....1..\\.\\.1.9.2...1.6.8...5.6...2.0.\\.I.P.C.$...?????.",
"pcap_cnt": 631360,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.58.139.245",
"src_port": 62146,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:53:20.397456+0000",
"tx_id": null
}
] | 407 | 1,463 |
172.31.64.4-172.31.0.2-59427-53-17 | [
"smb",
"smb"
] | pcap_cnt: 629695, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_NEGOTIATE_PROTOCOL, smb_status: UNKNOWN_00_0000, smb_status_code: 0x0000, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: LANMAN1.0, smb_client_dialects_1: LM1.2X002, smb_client_dialects_2: NT LANMAN 1.0, smb_client_dialects_3: NT LM 0.12, smb_server_guid: 16722384-9d76-48f7-e2aa-caf8db32f940 ; pcap_cnt: 629700, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_SESSION_SETUP_ANDX, smb_status: STATUS_ACCESS_DENIED, smb_status_code: 0xc0000022, smb_session_id: 0, smb_tree_id: 0, smb_request_native_os: &, smb_request_native_lm: , smb_response_native_os: , smb_response_native_lm: , metadata_flowbits_0: smb.tree.connect.ipc | null | BENIGN | false | 12:30:29.204100 | 1,205 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Generic Protocol Command Decode",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_09_23"
],
"cve": null,
"deployment": null,
"former_category": null,
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2010_09_23"
]
},
"rev": 9,
"severity": 3,
"signature": "GPL NETBIOS SMB-DS IPC$ share access",
"signature_id": 2102465,
"source": null,
"target": null
},
"app_proto": "smb",
"dest_ip": "172.31.66.8",
"dest_port": 445,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 398,
"bytes_toserver": 568,
"pkts_toclient": 4,
"pkts_toserver": 5,
"start": "2018-02-14T22:16:40.704296+0000"
},
"flow_id": 1538915593404200,
"http": null,
"metadata": {
"flowbits": [
"smb.tree.connect.ipc"
]
},
"packet": "ArZrzmDAAroyug5YCABFAACHP/VAAF8GCei2PS0vrB9CCP+gAb1ufYAVzbins1AYAgJWiAAAAAAAW/9TTUJ1AAAAABgBIAAAAAAAAAAAAAAAAAAAL0sAAMVeBP8AAAAAAAEAHAAAXFwxMDkuMTc3LjIwNC4xXElQQyQAPz8/Pz8AUEFUSF9SRVBMQUNFX18/Pz8/PwA=",
"packet_info": {
"linktype": 1
},
"payload": "AAAAW/9TTUJ1AAAAABgBIAAAAAAAAAAAAAAAAAAAL0sAAMVeBP8AAAAAAAEAHAAAXFwxMDkuMTc3LjIwNC4xXElQQyQAPz8/Pz8AUEFUSF9SRVBMQUNFX18/Pz8/PwA=",
"payload_printable": "...[.SMBu...... ............../K...^............\\\\109.177.204.1\\IPC$.?????.PATH_REPLACE__?????.",
"pcap_cnt": 629700,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "182.61.45.47",
"src_port": 65440,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:16:46.776883+0000",
"tx_id": null
}
] | 372 | 1,464 |
172.31.64.4-104.196.98.113-49772-80-6 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 100, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 624225, event_type: dns, proto: UDP, dns_type: query, dns_id: 35322, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 624226, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 35322, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e2201.ksd.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 17, dns_answers_0_rdata: 23.218.62.30, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:29.208054 | 72,697 | Wednesday-14-02-2018 | [] | 354 | 1,465 |
172.31.64.4-172.31.0.2-56054-53-17 | [
"dns",
"dns"
] | pcap_cnt: 631379, event_type: dns, proto: UDP, dns_type: query, dns_id: 54105, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 631380, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54105, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: x.akamaiedge.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: n0x.akamaiedge.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1518648798, dns_authorities_0_soa_refresh: 1000, dns_authorities_0_soa_retry: 1000, dns_authorities_0_soa_expire: 1000, dns_authorities_0_soa_minimum: 1800 | null | BENIGN | false | 12:30:29.208610 | 333 | Wednesday-14-02-2018 | [] | 358 | 1,466 |
172.31.64.4-172.31.0.2-55023-53-17 | [
"flow",
"tls"
] | event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 10, flow_bytes_toserver: 1835, flow_bytes_toclient: 5139, flow_age: 10, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 610639, event_type: tls, proto: TCP, tls_subject: C=US, ST=New York, L=New York, O=AppNexus, Inc., CN=*.adnxs.com, tls_issuerdn: C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 ECC 256 bit SSL CA - G2, tls_serial: 62:12:F0:4B:83:94:ED:75:37:1D:A9:D5:70:44:48:6C, tls_fingerprint: 1f:ea:8d:1e:46:2c:ea:75:4f:a0:bc:6a:0f:06:a1:3f:a1:e1:30:bc, tls_sni: secure.adnxs.com, tls_version: TLS 1.2, tls_notbefore: 2017-01-25T00:00:00, tls_notafter: 2019-01-25T23:59:59 | false | BENIGN | false | 12:30:29.209548 | 300 | Wednesday-14-02-2018 | [] | 420 | 1,467 |
172.31.64.4-172.31.0.2-52977-53-17 | [
"flow",
"tls"
] | event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 15, flow_bytes_toserver: 1702, flow_bytes_toclient: 4595, flow_age: 172, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 626607, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.googleapis.com, tls_issuerdn: C=US, O=Google Inc, CN=Google Internet Authority G2, tls_serial: 52:12:F1:CD:25:1B:B7:96, tls_fingerprint: 3c:1a:68:da:52:2b:14:a2:df:1b:b6:e0:b6:f6:99:9a:39:d4:e0:23, tls_sni: fonts.googleapis.com, tls_version: TLS 1.2, tls_notbefore: 2018-01-30T08:56:10, tls_notafter: 2018-04-24T08:30:00 | false | BENIGN | false | 12:30:29.209713 | 1,035 | Wednesday-14-02-2018 | [] | 378 | 1,468 |
172.31.64.4-172.31.0.2-51854-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 83, flow_bytes_toclient: 99, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 621973, event_type: dns, proto: UDP, dns_type: query, dns_id: 17934, dns_rrname: e11070.b.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 621974, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17934, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e11070.b.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e11070.b.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 20, dns_answers_0_rdata: 23.49.181.132, dns_grouped_A_0: 23.49.181.132 | false | BENIGN | false | 12:30:29.215616 | 949 | Wednesday-14-02-2018 | [] | 349 | 1,469 |
172.31.64.4-172.31.0.2-58717-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 92, flow_bytes_toclient: 108, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 615570, event_type: dns, proto: UDP, dns_type: query, dns_id: 40362, dns_rrname: pagead-googlehosted.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 615571, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40362, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pagead-googlehosted.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pagead-googlehosted.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 37, dns_answers_0_rdata: 216.58.211.161, dns_grouped_A_0: 216.58.211.161 | false | BENIGN | false | 12:30:29.260339 | 48,518 | Wednesday-14-02-2018 | [] | 351 | 1,470 |
172.31.64.4-216.58.198.66-49773-80-6 | [
"rdp"
] | pcap_cnt: 630798, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:29.370811 | 108,717 | Wednesday-14-02-2018 | [] | 61 | 1,471 |
172.31.64.4-130.211.9.211-49774-80-6 | [
"rdp"
] | pcap_cnt: 630463, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:29.408464 | 986,107 | Wednesday-14-02-2018 | [] | 46 | 1,472 |
172.31.64.4-172.31.0.2-50028-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 637128, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 637139, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 637141, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:29.409069 | 535 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "77.243.191.21",
"port": 49541
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "77.243.191.21",
"dest_port": 49541,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-15T00:22:29.226959+0000"
},
"flow_id": 605787198420623,
"http": null,
"metadata": {
"flowbits": [
"ms.rdp.synack"
]
},
"packet": "Aroyug5YArZrzmDACABFAAA7CXlAAIAGAACsH0IITfO/FQ09wYUq+W4TByQjo1AY+dX7XQAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 637137,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-15T00:22:44.562888+0000",
"tx_id": null
}
] | 276 | 1,473 |
172.31.64.4-172.31.0.2-62297-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 636002, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 636015, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 636017, event_type: rdp, proto: TCP, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:29.411178 | 34,545 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "212.92.116.246",
"port": 55027
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "212.92.116.246",
"dest_port": 55027,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 259,
"bytes_toserver": 314,
"pkts_toclient": 4,
"pkts_toserver": 4,
"start": "2018-02-14T23:58:17.859738+0000"
},
"flow_id": 580854818086490,
"http": null,
"metadata": null,
"packet": "Aroyug5YArZrzmDACABFAgA7J/dAAIAGAACsH0II1Fx09g091vOWY3FxlC4C2lAY+dU3qAAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 636014,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T23:58:28.541561+0000",
"tx_id": null
}
] | 231 | 1,474 |
172.31.64.4-34.237.173.172-49775-443-6 | [
"flow",
"http",
"fileinfo"
] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 443, flow_bytes_toclient: 770, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 5b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 637404, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 169.254.169.254, http_url: /latest/meta-data/iam/security-credentials, http_http_user_agent: aws-sdk-go/1.12.20 (go1.9; windows; amd64), http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 404, http_length: 345 ; pcap_cnt: 637406, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 169.254.169.254, http_url: /latest/meta-data/iam/security-credentials, http_http_user_agent: aws-sdk-go/1.12.20 (go1.9; windows; amd64), http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 404, http_length: 345, app_proto: http, fileinfo_filename: /latest/meta-data/iam/security-credentials, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 345, fileinfo_tx_id: 0 | false | BENIGN | false | 12:30:29.492004 | 978,022 | Wednesday-14-02-2018 | [] | 525 | 1,476 |
172.31.64.4-172.31.0.2-61656-53-17 | [
"dns",
"dns"
] | pcap_cnt: 628149, event_type: dns, proto: UDP, dns_type: query, dns_id: 44390, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 628150, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44390, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e4518.x.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 19, dns_answers_0_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167 | null | BENIGN | false | 12:30:29.492549 | 317 | Wednesday-14-02-2018 | [] | 271 | 1,477 |
172.31.64.4-172.31.0.2-64243-53-17 | [
"flow"
] | event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 1, flow_pkts_toclient: 0, flow_bytes_toserver: 75, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout | false | BENIGN | false | 12:30:29.493149 | 11,214 | Wednesday-14-02-2018 | [] | 78 | 1,478 |
172.31.64.4-172.31.0.2-56111-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 629524, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 629534, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 629536, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:29.654548 | 74,847 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "58.185.29.178",
"port": 61864
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "58.185.29.178",
"dest_port": 61864,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-14T22:12:44.685616+0000"
},
"flow_id": 439318050797104,
"http": null,
"metadata": {
"flowbits": [
"ms.rdp.synack"
]
},
"packet": "Aroyug5YArZrzmDACABFAAA7KDVAAIAGAACsH0IIOrkdsg098aiv97sDjvNpUFAY+dVGwAAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 629533,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:12:59.894938+0000",
"tx_id": null
}
] | 276 | 1,479 |
172.31.64.4-172.31.0.2-59363-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 71, flow_bytes_toclient: 201, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 622638, event_type: dns, proto: UDP, dns_type: query, dns_id: 9645, dns_rrname: auth.gfx.ms, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 622639, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9645, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: auth.gfx.ms, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: auth.gfx.ms, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: authgfx.msa.akadns6.net, dns_answers_1_rrname: authgfx.msa.akadns6.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 8, dns_answers_1_rdata: msagfx.live.com-6.edgekey.net, dns_answers_2_rrname: msagfx.live.com-6.edgekey.net, dns_answers_2_rrtype: CNAME, dns_answers_2_ttl: 60, dns_answers_2_rdata: e13551.dscg.akamaiedge.net, dns_answers_3_rrname: e13551.dscg.akamaiedge.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 15, dns_answers_3_rdata: 104.67.77.70, dns_grouped_CNAME_0: authgfx.msa.akadns6.net, dns_grouped_CNAME_1: msagfx.live.com-6.edgekey.net, dns_grouped_CNAME_2: e13551.dscg.akamaiedge.net, dns_grouped_A_0: 104.67.77.70 | false | BENIGN | false | 12:30:29.655672 | 13,167 | Wednesday-14-02-2018 | [] | 657 | 1,480 |
172.31.64.4-172.31.0.2-62546-53-17 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 628674, event_type: dns, proto: UDP, dns_type: query, dns_id: 33732, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 628675, event_type: dns, proto: UDP, dns_type: query, dns_id: 33732, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 628676, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33732, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 20, dns_answers_2_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net ; pcap_cnt: 628677, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33732, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 20, dns_answers_2_rdata: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net, dns_grouped_A_0: 23.13.154.167 | null | BENIGN | false | 12:30:29.656208 | 42,364 | Wednesday-14-02-2018 | [] | 943 | 1,481 |
172.31.64.4-172.31.0.2-56721-53-17 | [
"smb",
"smb"
] | pcap_cnt: 630251, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_NEGOTIATE_PROTOCOL, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: PC NETWORK PROGRAM 1.0, smb_client_dialects_1: LANMAN1.0, smb_client_dialects_2: Windows for Workgroups 3.1a, smb_client_dialects_3: LM1.2X002, smb_client_dialects_4: LANMAN2.1, smb_client_dialects_5: NT LM 0.12, smb_server_guid: 28e7dfc8-634b-ad83-0057-004f004b0052 ; pcap_cnt: 630253, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_SESSION_SETUP_ANDX, smb_status: STATUS_ACCESS_DENIED, smb_status_code: 0xc0000022, smb_session_id: 0, smb_tree_id: 0, smb_request_native_os: , smb_request_native_lm: , smb_response_native_os: , smb_response_native_lm: , metadata_flowbits_0: smb.tree.connect.ipc | null | BENIGN | false | 12:30:29.678420 | 3,880 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Generic Protocol Command Decode",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_09_23"
],
"cve": null,
"deployment": null,
"former_category": null,
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2010_09_23"
]
},
"rev": 9,
"severity": 3,
"signature": "GPL NETBIOS SMB-DS IPC$ unicode share access",
"signature_id": 2102466,
"source": null,
"target": null
},
"app_proto": "smb",
"dest_ip": "172.31.66.8",
"dest_port": 445,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 346,
"bytes_toserver": 655,
"pkts_toclient": 3,
"pkts_toserver": 5,
"start": "2018-02-14T22:28:02.440531+0000"
},
"flow_id": 1453226745575635,
"http": null,
"metadata": {
"flowbits": [
"smb.tree.connect.ipc"
]
},
"packet": "ArZrzmDAAroyug5YCABFAACIZgtAAGkGVCZkDAULrB9CCOP0Ab1BHA7IamgBsVAYP/4DngAAAAAAXP9TTUJ1AAAAABgHwAAAAAAAAAAAAAAAAAAA//4AAEAABP8AXAAIAAEAMQAAXABcADEAOQAyAC4AMQA2ADgALgA1ADYALgAyADAAXABJAFAAQwAkAAAAPz8/Pz8A",
"packet_info": {
"linktype": 1
},
"payload": "AAAAXP9TTUJ1AAAAABgHwAAAAAAAAAAAAAAAAAAA//4AAEAABP8AXAAIAAEAMQAAXABcADEAOQAyAC4AMQA2ADgALgA1ADYALgAyADAAXABJAFAAQwAkAAAAPz8/Pz8A",
"payload_printable": "...\\.SMBu.........................@....\\.....1..\\.\\.1.9.2...1.6.8...5.6...2.0.\\.I.P.C.$...?????.",
"pcap_cnt": 630253,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "100.12.5.11",
"src_port": 58356,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:28:02.562184+0000",
"tx_id": null
}
] | 406 | 1,482 |
172.31.64.4-172.31.0.2-57846-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 635644, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 635677, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 635679, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:29.770325 | 2,022 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Detection of a Network Scan",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": null,
"former_category": [
"SCAN"
],
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2023_11_14"
]
},
"rev": 21,
"severity": 3,
"signature": "ET SCAN Behavioral Unusually fast Terminal Server Traffic Potential Scan or Infection (Inbound)",
"signature_id": 2001972,
"source": null,
"target": null
},
"app_proto": null,
"dest_ip": "172.31.66.8",
"dest_port": 3389,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 0,
"bytes_toserver": 66,
"pkts_toclient": 0,
"pkts_toserver": 1,
"start": "2018-02-14T23:51:08.055129+0000"
},
"flow_id": 516404510775129,
"http": null,
"metadata": null,
"packet": "ArZrzmDAAroyug5YCABFAAA0KQtAAGYGtS7UXHQGrB9CCMDfDT3DTYJyAAAAAIACIAAFFQAAAgQFSAEDAwgBAQQC",
"packet_info": {
"linktype": 1
},
"payload": "",
"payload_printable": "",
"pcap_cnt": 635640,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "212.92.116.6",
"src_port": 49375,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T23:51:08.055129+0000",
"tx_id": null
},
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "212.92.116.6",
"port": 49375
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "212.92.116.6",
"dest_port": 49375,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-14T23:51:08.055129+0000"
},
"flow_id": 516404510775129,
"http": null,
"metadata": {
"flowbits": [
"ms.rdp.synack"
]
},
"packet": "Aroyug5YArZrzmDACABFAAA7M9hAAIAGAACsH0II1Fx0Bg09wN+LhTjJw02CnlAY+dU2uAAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 635676,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T23:51:19.390943+0000",
"tx_id": null
}
] | 276 | 1,483 |
172.31.64.4-172.31.0.2-63966-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 86, flow_bytes_toclient: 102, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 622506, event_type: dns, proto: UDP, dns_type: query, dns_id: 22125, dns_rrname: e13678.dscg.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 622507, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 22125, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e13678.dscg.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e13678.dscg.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 12, dns_answers_0_rdata: 23.196.57.205, dns_grouped_A_0: 23.196.57.205 | false | BENIGN | false | 12:30:29.785351 | 469 | Wednesday-14-02-2018 | [] | 357 | 1,485 |
172.31.64.4-172.31.0.2-49174-53-17 | [
"flow",
"http",
"fileinfo"
] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 443, flow_bytes_toclient: 770, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 5b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 637414, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 169.254.169.254, http_url: /latest/meta-data/iam/security-credentials, http_http_user_agent: aws-sdk-go/1.12.20 (go1.9; windows; amd64), http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 404, http_length: 345 ; pcap_cnt: 637416, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 169.254.169.254, http_url: /latest/meta-data/iam/security-credentials, http_http_user_agent: aws-sdk-go/1.12.20 (go1.9; windows; amd64), http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 404, http_length: 345, app_proto: http, fileinfo_filename: /latest/meta-data/iam/security-credentials, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 345, fileinfo_tx_id: 0 | false | BENIGN | false | 12:30:29.786276 | 349 | Wednesday-14-02-2018 | [] | 525 | 1,486 |
172.31.64.4-172.31.0.2-54698-53-17 | [
"rdp"
] | pcap_cnt: 633369, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:29.786805 | 414 | Wednesday-14-02-2018 | [] | 47 | 1,487 |
172.31.64.4-23.218.112.140-49776-80-6 | [
"dns",
"dns"
] | pcap_cnt: 631826, event_type: dns, proto: UDP, dns_type: query, dns_id: 46712, dns_rrname: s3.us-east-2.amazonaws.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 631827, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46712, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s3.us-east-2.amazonaws.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: s3.us-east-2.amazonaws.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 0, dns_answers_0_rdata: 52.219.88.186, dns_grouped_A_0: 52.219.88.186 | null | BENIGN | false | 12:30:29.788222 | 709,696 | Wednesday-14-02-2018 | [] | 276 | 1,488 |
172.31.64.4-172.31.0.2-60665-53-17 | [
"smb",
"smb"
] | pcap_cnt: 635990, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_NEGOTIATE_PROTOCOL, smb_status: UNKNOWN_00_0000, smb_status_code: 0x0000, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: LANMAN1.0, smb_client_dialects_1: LM1.2X002, smb_client_dialects_2: NT LANMAN 1.0, smb_client_dialects_3: NT LM 0.12, smb_server_guid: 16722384-9d76-48f7-e2aa-caf8db32f940 ; pcap_cnt: 635993, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_SESSION_SETUP_ANDX, smb_status: STATUS_ACCESS_DENIED, smb_status_code: 0xc0000022, smb_session_id: 0, smb_tree_id: 0, smb_request_native_os: &, smb_request_native_lm: , smb_response_native_os: , smb_response_native_lm: , metadata_flowbits_0: smb.tree.connect.ipc | null | BENIGN | false | 12:30:29.788652 | 12,781 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Generic Protocol Command Decode",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_09_23"
],
"cve": null,
"deployment": null,
"former_category": null,
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2010_09_23"
]
},
"rev": 9,
"severity": 3,
"signature": "GPL NETBIOS SMB-DS IPC$ share access",
"signature_id": 2102465,
"source": null,
"target": null
},
"app_proto": "smb",
"dest_ip": "172.31.66.8",
"dest_port": 445,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 376,
"bytes_toserver": 670,
"pkts_toclient": 3,
"pkts_toserver": 6,
"start": "2018-02-14T23:58:12.149495+0000"
},
"flow_id": 1854192361949175,
"http": null,
"metadata": {
"flowbits": [
"smb.tree.connect.ipc"
]
},
"packet": "ArZrzmDAAroyug5YCABFAAB/1pVAACkG06SV/yMYrB9CCKsxAb3iUUuHnYZJOoAYAO0YMAAAAQEICt87nVUCdfmMAAAAR/9TTUJ1AAAAABgBIAAAAAAAAAAAAAAAAAAAL0sAAMVeBP8AAAAAAAEAGgAAXFwxOC4yMjEuMTEuMjM0XElQQyQAPz8/Pz8A",
"packet_info": {
"linktype": 1
},
"payload": "AAAAR/9TTUJ1AAAAABgBIAAAAAAAAAAAAAAAAAAAL0sAAMVeBP8AAAAAAAEAGgAAXFwxOC4yMjEuMTEuMjM0XElQQyQAPz8/Pz8A",
"payload_printable": "...G.SMBu...... ............../K...^............\\\\18.221.11.234\\IPC$.?????.",
"pcap_cnt": 635993,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "149.255.35.24",
"src_port": 43825,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T23:58:12.396935+0000",
"tx_id": null
}
] | 372 | 1,489 |
172.31.64.4-172.31.0.2-51121-53-17 | [
"flow",
"http",
"fileinfo",
"fileinfo"
] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 17, flow_pkts_toclient: 15, flow_bytes_toserver: 1377, flow_bytes_toclient: 1742, flow_age: 115, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 600293, event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471 ; pcap_cnt: 600293, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 0 ; pcap_cnt: 600362, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 471, fileinfo_tx_id: 0 | false | BENIGN | false | 12:30:29.791302 | 11,106 | Wednesday-14-02-2018 | [] | 664 | 1,490 |
172.31.64.4-172.31.0.2-50954-53-17 | [
"tls"
] | pcap_cnt: 628498, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: www.faxfx.net, tls_version: TLS 1.2 | null | BENIGN | false | 12:30:29.802848 | 43,520 | Wednesday-14-02-2018 | [] | 53 | 1,491 |
172.31.64.4-172.31.0.2-54269-53-17 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 628743, event_type: dns, proto: UDP, dns_type: query, dns_id: 29937, dns_rrname: tj.symcd.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 628744, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29937, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tj.symcd.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tj.symcd.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: ocsp-ds.ws.symantec.com.edgekey.net, dns_answers_1_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 4, dns_answers_1_rdata: e8218.dscb1.akamaiedge.net, dns_answers_2_rrname: e8218.dscb1.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 4, dns_answers_2_rdata: 23.52.91.27, dns_grouped_A_0: 23.52.91.27, dns_grouped_CNAME_0: ocsp-ds.ws.symantec.com.edgekey.net, dns_grouped_CNAME_1: e8218.dscb1.akamaiedge.net ; pcap_cnt: 628745, event_type: dns, proto: UDP, dns_type: query, dns_id: 29937, dns_rrname: tj.symcd.com, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 628746, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29937, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tj.symcd.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tj.symcd.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: ocsp-ds.ws.symantec.com.edgekey.net, dns_answers_1_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 4, dns_answers_1_rdata: e8218.dscb1.akamaiedge.net, dns_answers_2_rrname: e8218.dscb1.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 4, dns_answers_2_rdata: 23.52.91.27, dns_grouped_A_0: 23.52.91.27, dns_grouped_CNAME_0: ocsp-ds.ws.symantec.com.edgekey.net, dns_grouped_CNAME_1: e8218.dscb1.akamaiedge.net | null | BENIGN | false | 12:30:29.817394 | 87,658 | Wednesday-14-02-2018 | [] | 979 | 1,492 |
172.31.64.4-172.31.0.2-63797-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 100, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 616646, event_type: dns, proto: UDP, dns_type: query, dns_id: 32250, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 616647, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32250, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e2201.ksd.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 18, dns_answers_0_rdata: 23.218.62.30, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:29.817859 | 25,801 | Wednesday-14-02-2018 | [] | 354 | 1,493 |
172.31.64.4-172.31.0.2-63987-53-17 | [
"smb",
"smb"
] | pcap_cnt: 631693, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_NEGOTIATE_PROTOCOL, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: PC NETWORK PROGRAM 1.0, smb_client_dialects_1: LANMAN1.0, smb_client_dialects_2: Windows for Workgroups 3.1a, smb_client_dialects_3: LM1.2X002, smb_client_dialects_4: LANMAN2.1, smb_client_dialects_5: NT LM 0.12, smb_server_guid: e343b1e1-447d-b4b4-0057-004f004b0052 ; pcap_cnt: 631695, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_SESSION_SETUP_ANDX, smb_status: STATUS_ACCESS_DENIED, smb_status_code: 0xc0000022, smb_session_id: 0, smb_tree_id: 0, smb_request_native_os: , smb_request_native_lm: , smb_response_native_os: , smb_response_native_lm: , metadata_flowbits_0: smb.tree.connect.ipc | null | BENIGN | false | 12:30:29.844690 | 328 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Generic Protocol Command Decode",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_09_23"
],
"cve": null,
"deployment": null,
"former_category": null,
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2010_09_23"
]
},
"rev": 9,
"severity": 3,
"signature": "GPL NETBIOS SMB-DS IPC$ unicode share access",
"signature_id": 2102466,
"source": null,
"target": null
},
"app_proto": "smb",
"dest_ip": "172.31.66.8",
"dest_port": 445,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 346,
"bytes_toserver": 655,
"pkts_toclient": 3,
"pkts_toserver": 5,
"start": "2018-02-14T22:58:37.682702+0000"
},
"flow_id": 1579687882877646,
"http": null,
"metadata": {
"flowbits": [
"smb.tree.connect.ipc"
]
},
"packet": "ArZrzmDAAroyug5YCABFAACITFxAAGoGLTXGzOHqrB9CCMvuAb0HrgbV2+gqd1AYAP/CHQAAAAAAXP9TTUJ1AAAAABgHwAAAAAAAAAAAAAAAAAAA//4AAEAABP8AXAAIAAEAMQAAXABcADEAOQAyAC4AMQA2ADgALgA1ADYALgAyADAAXABJAFAAQwAkAAAAPz8/Pz8A",
"packet_info": {
"linktype": 1
},
"payload": "AAAAXP9TTUJ1AAAAABgHwAAAAAAAAAAAAAAAAAAA//4AAEAABP8AXAAIAAEAMQAAXABcADEAOQAyAC4AMQA2ADgALgA1ADYALgAyADAAXABJAFAAQwAkAAAAPz8/Pz8A",
"payload_printable": "...\\.SMBu.........................@....\\.....1..\\.\\.1.9.2...1.6.8...5.6...2.0.\\.I.P.C.$...?????.",
"pcap_cnt": 631695,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "198.204.225.234",
"src_port": 52206,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:58:37.804277+0000",
"tx_id": null
}
] | 409 | 1,494 |
172.31.64.4-172.31.0.2-60061-53-17 | [
"flow",
"http",
"fileinfo",
"fileinfo",
"http",
"fileinfo",
"fileinfo",
"http",
"fileinfo",
"fileinfo",
"http",
"fileinfo",
"fileinfo",
"http",
"fileinfo",
"fileinfo",
"http",
"fileinfo",
"fileinfo"
] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 26, flow_pkts_toclient: 21, flow_bytes_toserver: 4055, flow_bytes_toclient: 6794, flow_age: 124, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 652480, event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471 ; pcap_cnt: 652480, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 0 ; pcap_cnt: 652668, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 471, fileinfo_tx_id: 0 ; pcap_cnt: 652729, event_type: http, proto: TCP, tx_id: 1, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471 ; pcap_cnt: 652729, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 1 ; pcap_cnt: 652929, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 471, fileinfo_tx_id: 1 ; pcap_cnt: 653004, event_type: http, proto: TCP, tx_id: 2, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471 ; pcap_cnt: 653004, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 2 ; pcap_cnt: 653519, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 471, fileinfo_tx_id: 2 ; pcap_cnt: 653577, event_type: http, proto: TCP, tx_id: 3, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471 ; pcap_cnt: 653577, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 3 ; pcap_cnt: 653873, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 471, fileinfo_tx_id: 3 ; pcap_cnt: 653883, event_type: http, proto: TCP, tx_id: 4, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471 ; pcap_cnt: 653883, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 4 ; pcap_cnt: 653884, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 471, fileinfo_tx_id: 4 ; pcap_cnt: 653930, event_type: http, proto: TCP, tx_id: 5, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471 ; pcap_cnt: 653930, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 5 ; pcap_cnt: 654061, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 471, fileinfo_tx_id: 5 | false | BENIGN | false | 12:30:29.846717 | 242 | Wednesday-14-02-2018 | [] | 3,217 | 1,495 |
172.31.64.4-172.31.0.2-60184-53-17 | [
"rdp"
] | pcap_cnt: 629444, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:29.849034 | 13,866 | Wednesday-14-02-2018 | [] | 62 | 1,496 |
172.31.64.4-209.85.203.113-49777-443-6 | [
"flow",
"tls"
] | event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 14, flow_bytes_toserver: 930, flow_bytes_toclient: 4678, flow_age: 29, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 622092, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=San Francisco, O=Optimizely, Inc., CN=logx.optimizely.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0D:78:9F:02:B2:F7:0D:FE:12:2B:09:FA:B2:FB:67:45, tls_fingerprint: c5:23:f9:02:d3:5d:02:f6:1f:cc:e2:af:78:a1:b1:f6:07:35:75:9a, tls_sni: logx.optimizely.com, tls_version: TLS 1.2, tls_notbefore: 2016-10-04T00:00:00, tls_notafter: 2018-10-09T12:00:00 | false | BENIGN | false | 12:30:29.871171 | 701,984 | Wednesday-14-02-2018 | [] | 419 | 1,497 |
172.31.64.4-172.31.0.2-52191-53-17 | [
"rdp"
] | pcap_cnt: 635047, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:29.901990 | 370 | Wednesday-14-02-2018 | [] | 62 | 1,498 |
172.31.64.4-172.31.0.2-63330-53-17 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 637238, event_type: dns, proto: UDP, dns_type: query, dns_id: 32055, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 637239, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32055, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 20, dns_answers_2_rdata: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net, dns_grouped_A_0: 23.13.154.167 ; pcap_cnt: 637240, event_type: dns, proto: UDP, dns_type: query, dns_id: 32055, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 637241, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32055, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 20, dns_answers_2_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net | null | BENIGN | false | 12:30:29.902614 | 12,685 | Wednesday-14-02-2018 | [] | 943 | 1,499 |
172.31.64.4-172.31.0.2-60498-53-17 | [
"dns",
"dns",
"dns",
"dns"
] | pcap_cnt: 635322, event_type: dns, proto: UDP, dns_type: query, dns_id: 24484, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 635323, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24484, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 8, dns_answers_2_rdata: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net, dns_grouped_A_0: 23.13.154.167 ; pcap_cnt: 635324, event_type: dns, proto: UDP, dns_type: query, dns_id: 24484, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 635325, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24484, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c.go-mpulse.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c.go-mpulse.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrname: wildcard.go-mpulse.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: e4518.x.akamaiedge.net, dns_answers_2_rrname: e4518.x.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 8, dns_answers_2_rdata: 23.13.154.167, dns_grouped_CNAME_0: wildcard.go-mpulse.net.edgekey.net, dns_grouped_CNAME_1: e4518.x.akamaiedge.net, dns_grouped_A_0: 23.13.154.167 | null | BENIGN | false | 12:30:29.941975 | 300,307 | Wednesday-14-02-2018 | [] | 943 | 1,501 |
172.31.64.4-172.31.0.2-64123-53-17 | [
"dns",
"dns"
] | pcap_cnt: 628280, event_type: dns, proto: UDP, dns_type: query, dns_id: 34379, dns_rrname: www.faxfx.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 628281, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 34379, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.faxfx.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: faxfx.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns1.host-h.net, dns_authorities_0_soa_rname: postmaster.your-server.co.za, dns_authorities_0_soa_serial: 2014091001, dns_authorities_0_soa_refresh: 86400, dns_authorities_0_soa_retry: 1800, dns_authorities_0_soa_expire: 3600000, dns_authorities_0_soa_minimum: 86400 | null | BENIGN | false | 12:30:29.942356 | 93,846 | Wednesday-14-02-2018 | [] | 346 | 1,502 |
172.31.64.4-172.31.0.2-63644-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 149, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 615311, event_type: dns, proto: UDP, dns_type: query, dns_id: 17843, dns_rrname: ads-bid.l.doubleclick.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 615312, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17843, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ads-bid.l.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ads-bid.l.doubleclick.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 209.85.203.154, dns_answers_1_rrname: ads-bid.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 209.85.203.155, dns_answers_2_rrname: ads-bid.l.doubleclick.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 209.85.203.156, dns_answers_3_rrname: ads-bid.l.doubleclick.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 209.85.203.157, dns_grouped_A_0: 209.85.203.154, dns_grouped_A_1: 209.85.203.155, dns_grouped_A_2: 209.85.203.156, dns_grouped_A_3: 209.85.203.157 | false | BENIGN | false | 12:30:29.942702 | 43,643 | Wednesday-14-02-2018 | [] | 612 | 1,503 |
172.31.64.4-172.31.0.2-56813-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 98, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 634642, event_type: dns, proto: UDP, dns_type: query, dns_id: 49316, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 634643, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 49316, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e4518.x.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e4518.x.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 20, dns_answers_0_rdata: 23.13.154.167, dns_grouped_A_0: 23.13.154.167 | false | BENIGN | false | 12:30:29.989037 | 42,222 | Wednesday-14-02-2018 | [] | 351 | 1,504 |
172.31.64.4-209.85.203.113-49778-443-6 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 635200, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 635208, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 635213, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:30.011008 | 396,888 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "152.101.118.11",
"port": 64907
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "152.101.118.11",
"dest_port": 64907,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-14T23:42:02.863634+0000"
},
"flow_id": 100037460372882,
"http": null,
"metadata": {
"flowbits": [
"ms.rdp.synack"
]
},
"packet": "Aroyug5YArZrzmDACABFAAA7XRNAAIAGAACsH0IImGV2Cw09/YtpJOpJcse0nlAY+dX8xQAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 635207,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T23:42:18.178945+0000",
"tx_id": null
}
] | 276 | 1,505 |
172.31.64.4-172.31.0.2-50918-53-17 | [
"flow",
"tls"
] | event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 12, flow_bytes_toserver: 876, flow_bytes_toclient: 4201, flow_age: 29, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 622096, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=San Francisco, O=Optimizely, Inc., CN=logx.optimizely.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0D:78:9F:02:B2:F7:0D:FE:12:2B:09:FA:B2:FB:67:45, tls_fingerprint: c5:23:f9:02:d3:5d:02:f6:1f:cc:e2:af:78:a1:b1:f6:07:35:75:9a, tls_sni: logx.optimizely.com, tls_version: TLS 1.2, tls_notbefore: 2016-10-04T00:00:00, tls_notafter: 2018-10-09T12:00:00 | false | BENIGN | false | 12:30:30.031765 | 398 | Wednesday-14-02-2018 | [] | 419 | 1,506 |
172.31.64.4-172.31.0.2-50396-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 100, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 619589, event_type: dns, proto: UDP, dns_type: query, dns_id: 40408, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 619590, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40408, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e2201.ksd.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e2201.ksd.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 15, dns_answers_0_rdata: 23.218.62.30, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:30.032400 | 1,020 | Wednesday-14-02-2018 | [] | 354 | 1,507 |
172.31.64.4-172.31.0.2-56296-53-17 | [
"smb",
"smb"
] | pcap_cnt: 630393, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_NEGOTIATE_PROTOCOL, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: PC NETWORK PROGRAM 1.0, smb_client_dialects_1: LANMAN1.0, smb_client_dialects_2: Windows for Workgroups 3.1a, smb_client_dialects_3: LM1.2X002, smb_client_dialects_4: LANMAN2.1, smb_client_dialects_5: NT LM 0.12, smb_server_guid: a6bc517e-35ba-59f5-0057-004f004b0052 ; pcap_cnt: 630395, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: NT LM 0.12, smb_command: SMB1_COMMAND_SESSION_SETUP_ANDX, smb_status: STATUS_ACCESS_DENIED, smb_status_code: 0xc0000022, smb_session_id: 0, smb_tree_id: 0, smb_request_native_os: , smb_request_native_lm: , smb_response_native_os: , smb_response_native_lm: , metadata_flowbits_0: smb.tree.connect.ipc | null | BENIGN | false | 12:30:30.033761 | 37,669 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Generic Protocol Command Decode",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_09_23"
],
"cve": null,
"deployment": null,
"former_category": null,
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2010_09_23"
]
},
"rev": 9,
"severity": 3,
"signature": "GPL NETBIOS SMB-DS IPC$ unicode share access",
"signature_id": 2102466,
"source": null,
"target": null
},
"app_proto": "smb",
"dest_ip": "172.31.66.8",
"dest_port": 445,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 346,
"bytes_toserver": 655,
"pkts_toclient": 3,
"pkts_toserver": 5,
"start": "2018-02-14T22:31:21.461718+0000"
},
"flow_id": 1591790993476502,
"http": null,
"metadata": {
"flowbits": [
"smb.tree.connect.ipc"
]
},
"packet": "ArZrzmDAAroyug5YCABFAACIOhtAAGUGIh11ZlWqrB9CCM93Ab2c7/+pRhYyxlAYP/5cqQAAAAAAXP9TTUJ1AAAAABgHwAAAAAAAAAAAAAAAAAAA//4AAEAABP8AXAAIAAEAMQAAXABcADEAOQAyAC4AMQA2ADgALgA1ADYALgAyADAAXABJAFAAQwAkAAAAPz8/Pz8A",
"packet_info": {
"linktype": 1
},
"payload": "AAAAXP9TTUJ1AAAAABgHwAAAAAAAAAAAAAAAAAAA//4AAEAABP8AXAAIAAEAMQAAXABcADEAOQAyAC4AMQA2ADgALgA1ADYALgAyADAAXABJAFAAQwAkAAAAPz8/Pz8A",
"payload_printable": "...\\.SMBu.........................@....\\.....1..\\.\\.1.9.2...1.6.8...5.6...2.0.\\.I.P.C.$...?????.",
"pcap_cnt": 630395,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "117.102.85.170",
"src_port": 53111,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:31:22.327208+0000",
"tx_id": null
}
] | 405 | 1,508 |
172.31.64.4-172.31.0.2-63239-53-17 | [
"rdp"
] | pcap_cnt: 631426, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:30.080696 | 443 | Wednesday-14-02-2018 | [] | 47 | 1,510 |
172.31.64.4-172.31.0.2-60086-53-17 | [
"dns",
"dns"
] | pcap_cnt: 637381, event_type: dns, proto: UDP, dns_type: query, dns_id: 59805, dns_rrname: isatap.us-east-2.compute.internal, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 637382, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59805, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: isatap.us-east-2.compute.internal, dns_rrtype: A, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: us-east-2.compute.internal, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 40, dns_authorities_0_soa_mname: ns0.us-east-2.compute.internal, dns_authorities_0_soa_rname: hostmaster.amazon.com, dns_authorities_0_soa_serial: 2012103100, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 3600, dns_authorities_0_soa_minimum: 60 | null | BENIGN | false | 12:30:30.102882 | 23,877 | Wednesday-14-02-2018 | [] | 366 | 1,511 |
172.31.64.4-172.31.0.2-61043-53-17 | [
"rdp"
] | pcap_cnt: 637234, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:30.103284 | 989 | Wednesday-14-02-2018 | [] | 62 | 1,512 |
172.31.64.4-172.31.0.2-56801-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 181, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 624484, event_type: dns, proto: UDP, dns_type: query, dns_id: 22488, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 624485, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 22488, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure.livechatinc.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 48, dns_answers_0_rdata: secure.livechatinc.com.edgekey.net, dns_answers_1_rrname: secure.livechatinc.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 48, dns_answers_1_rdata: e2201.ksd.akamaiedge.net, dns_answers_2_rrname: e2201.ksd.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 9, dns_answers_2_rdata: 23.218.62.30, dns_grouped_CNAME_0: secure.livechatinc.com.edgekey.net, dns_grouped_CNAME_1: e2201.ksd.akamaiedge.net, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:30.106024 | 1,330 | Wednesday-14-02-2018 | [] | 545 | 1,513 |
172.31.64.4-172.31.0.2-65398-53-17 | [
"rdp",
"rdp",
"rdp"
] | pcap_cnt: 629449, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello ; pcap_cnt: 629457, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid ; pcap_cnt: 629459, event_type: rdp, proto: TCP, rdp_tx_id: 2, rdp_event_type: tls_handshake, rdp_x509_serials_0: 19280e064933cf8748a14d4b31efe5c3 | null | BENIGN | false | 12:30:30.107679 | 270 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Misc activity",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": [
"Client_and_Server"
],
"confidence": [
"Medium"
],
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": [
"Perimeter"
],
"former_category": [
"INFO"
],
"malware_family": null,
"performance_impact": [
"Significant"
],
"reviewed_at": null,
"signature_severity": [
"Informational"
],
"tag": null,
"updated_at": [
"2023_04_25"
]
},
"rev": 10,
"severity": 3,
"signature": "ET INFO RDP - Response To External Host",
"signature_id": 2001330,
"source": {
"ip": "206.47.141.237",
"port": 49441
},
"target": {
"ip": "172.31.66.8",
"port": 3389
}
},
"app_proto": "rdp",
"dest_ip": "206.47.141.237",
"dest_port": 49441,
"dns": null,
"ether": {
"dest_mac": "02:ba:32:ba:0e:58",
"src_mac": "02:b6:6b:ce:60:c0"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 193,
"bytes_toserver": 217,
"pkts_toclient": 3,
"pkts_toserver": 3,
"start": "2018-02-14T22:11:20.835119+0000"
},
"flow_id": 128203499290159,
"http": null,
"metadata": null,
"packet": "Aroyug5YArZrzmDACABFAgA7HIJAAIAGAACsH0IIzi+N7Q09wSGB3uBJUMYQ71AY+dVKcgAAAwAAEw7QAAASNAACHwgAAgAAAA==",
"packet_info": {
"linktype": 1
},
"payload": "AwAAEw7QAAASNAACHwgAAgAAAA==",
"payload_printable": ".........4.........",
"pcap_cnt": 629456,
"proto": "TCP",
"rdp": null,
"sip": null,
"smb": null,
"snmp": null,
"src_ip": "172.31.66.8",
"src_port": 3389,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-14T22:11:33.080684+0000",
"tx_id": null
}
] | 231 | 1,514 |
172.31.64.4-172.31.0.2-52108-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 181, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 623935, event_type: dns, proto: UDP, dns_type: query, dns_id: 25095, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 623936, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25095, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure.livechatinc.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 47, dns_answers_0_rdata: secure.livechatinc.com.edgekey.net, dns_answers_1_rrname: secure.livechatinc.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 47, dns_answers_1_rdata: e2201.ksd.akamaiedge.net, dns_answers_2_rrname: e2201.ksd.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 5, dns_answers_2_rdata: 23.218.62.30, dns_grouped_CNAME_0: secure.livechatinc.com.edgekey.net, dns_grouped_CNAME_1: e2201.ksd.akamaiedge.net, dns_grouped_A_0: 23.218.62.30 | false | BENIGN | false | 12:30:30.109418 | 1,476 | Wednesday-14-02-2018 | [] | 545 | 1,515 |
172.31.64.4-172.31.0.2-53813-53-17 | [
"rdp"
] | pcap_cnt: 635804, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:30.111209 | 314 | Wednesday-14-02-2018 | [] | 47 | 1,516 |
172.31.64.4-172.31.0.2-57769-53-17 | [
"flow"
] | event_type: flow, proto: TCP, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 140, flow_bytes_toclient: 116, flow_age: 3, flow_state: new, flow_reason: timeout, tcp_tcp_flags: 12, tcp_tcp_flags_ts: 02, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_ack: True, tcp_state: syn_recv | false | BENIGN | false | 12:30:30.111875 | 926 | Wednesday-14-02-2018 | [] | 123 | 1,517 |
172.31.64.4-172.31.0.2-58267-53-17 | [
"dns",
"dns"
] | pcap_cnt: 631568, event_type: dns, proto: UDP, dns_type: query, dns_id: 41498, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 631569, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 41498, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: getpocket-cdn.prod.mozaws.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 4, dns_answers_0_rdata: 54.192.193.78, dns_grouped_A_0: 54.192.193.78 | null | BENIGN | false | 12:30:30.122521 | 958 | Wednesday-14-02-2018 | [] | 274 | 1,518 |
172.31.64.4-172.31.0.2-63557-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 83, flow_bytes_toclient: 221, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 622357, event_type: dns, proto: UDP, dns_type: query, dns_id: 24592, dns_rrname: conductor.clicktale.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 622358, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24592, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: conductor.clicktale.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: conductor.clicktale.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: nv-p2-elb-ext-spray-01-308118214.us-east-1.elb.amazonaws.com, dns_answers_1_rrname: nv-p2-elb-ext-spray-01-308118214.us-east-1.elb.amazonaws.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 16, dns_answers_1_rdata: 52.4.13.99, dns_answers_2_rrname: nv-p2-elb-ext-spray-01-308118214.us-east-1.elb.amazonaws.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 16, dns_answers_2_rdata: 52.22.68.31, dns_answers_3_rrname: nv-p2-elb-ext-spray-01-308118214.us-east-1.elb.amazonaws.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 16, dns_answers_3_rdata: 52.22.163.156, dns_answers_4_rrname: nv-p2-elb-ext-spray-01-308118214.us-east-1.elb.amazonaws.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 16, dns_answers_4_rdata: 52.207.156.239, dns_grouped_CNAME_0: nv-p2-elb-ext-spray-01-308118214.us-east-1.elb.amazonaws.com, dns_grouped_A_0: 52.4.13.99, dns_grouped_A_1: 52.22.68.31, dns_grouped_A_2: 52.22.163.156, dns_grouped_A_3: 52.207.156.239 | false | BENIGN | false | 12:30:30.123817 | 272 | Wednesday-14-02-2018 | [] | 841 | 1,519 |
172.31.64.4-172.31.0.2-53626-53-17 | [
"rdp"
] | pcap_cnt: 628269, event_type: rdp, proto: TCP, metadata_flowbits_0: ms.rdp.synack, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:30.124332 | 863 | Wednesday-14-02-2018 | [] | 62 | 1,520 |
172.31.64.4-172.31.0.2-59743-53-17 | [
"sip"
] | pcap_cnt: 637175, event_type: sip, proto: UDP, sip_method: OPTIONS, sip_uri: sip:[email protected], sip_version: SIP/2.0, sip_request_line: OPTIONS sip:[email protected] SIP/2.0 | null | BENIGN | false | 12:30:30.125512 | 1,490 | Wednesday-14-02-2018 | [
{
"alert": {
"action": "allowed",
"category": "Attempted Information Leak",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": null,
"former_category": null,
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2010_07_30"
]
},
"rev": 4,
"severity": 2,
"signature": "ET SCAN Sipvicious Scan",
"signature_id": 2008578,
"source": null,
"target": null
},
"app_proto": "sip",
"dest_ip": "172.31.66.8",
"dest_port": 5060,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 0,
"bytes_toserver": 464,
"pkts_toclient": 0,
"pkts_toserver": 1,
"start": "2018-02-15T00:24:07.705829+0000"
},
"flow_id": 1927842563081509,
"http": null,
"metadata": null,
"packet": "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",
"packet_info": {
"linktype": 1
},
"payload": "T1BUSU9OUyBzaXA6MTAwQDE4LjIyMS4xMS4yMzQgU0lQLzIuMA0KVmlhOiBTSVAvMi4wL1VEUCAxNjMuMTcyLjIwMy4xNjg6NTA4MjticmFuY2g9ejloRzRiSy0xNjA0NDM0NDgzO3Jwb3J0DQpDb250ZW50LUxlbmd0aDogMA0KRnJvbTogInNpcHZpY2lvdXMiPHNpcDo5MDUwMUAxLjEuMS4xPjt0YWc9MzEzMjY0NjQzMDYyNjU2MTMxMzM2MzM0MDEzNDMwMzgzMjM1MzAzODMxMzIzMQ0KQWNjZXB0OiBhcHBsaWNhdGlvbi9zZHANClVzZXItQWdlbnQ6IGZyaWVuZGx5LXNjYW5uZXINClRvOiAic2lwdmljaW91cyI8c2lwOjkwNTAxQDEuMS4xLjE+DQpDb250YWN0OiBzaXA6MTAwQDE2My4xNzIuMjAzLjE2ODo1MDgyDQpDU2VxOiAxIE9QVElPTlMNCkNhbGwtSUQ6IDQ5NDQ4NTkwNzQ0NDgxMTA1MTk3MDYzMg0KTWF4LUZvcndhcmRzOiA3MA0KDQo=",
"payload_printable": "OPTIONS sip:[email protected] SIP/2.0\r\nVia: SIP/2.0/UDP 163.172.203.168:5082;branch=z9hG4bK-1604434483;rport\r\nContent-Length: 0\r\nFrom: \"sipvicious\"<sip:[email protected]>;tag=3132646430626561313363340134303832353038313231\r\nAccept: application/sdp\r\nUser-Agent: friendly-scanner\r\nTo: \"sipvicious\"<sip:[email protected]>\r\nContact: sip:[email protected]:5082\r\nCSeq: 1 OPTIONS\r\nCall-ID: 494485907444811051970632\r\nMax-Forwards: 70\r\n\r\n",
"pcap_cnt": 637175,
"proto": "UDP",
"rdp": null,
"sip": {
"method": "OPTIONS",
"request_line": "OPTIONS sip:[email protected] SIP/2.0",
"uri": "sip:[email protected]",
"version": "SIP/2.0"
},
"smb": null,
"snmp": null,
"src_ip": "163.172.203.168",
"src_port": 5082,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-15T00:24:07.705829+0000",
"tx_id": null
},
{
"alert": {
"action": "allowed",
"category": "Attempted Information Leak",
"gid": 1,
"metadata": {
"affected_product": null,
"attack_target": null,
"confidence": null,
"created_at": [
"2010_07_30"
],
"cve": null,
"deployment": null,
"former_category": null,
"malware_family": null,
"performance_impact": null,
"reviewed_at": null,
"signature_severity": null,
"tag": null,
"updated_at": [
"2010_07_30"
]
},
"rev": 3,
"severity": 2,
"signature": "ET SCAN Sipvicious User-Agent Detected (friendly-scanner)",
"signature_id": 2011716,
"source": null,
"target": null
},
"app_proto": "sip",
"dest_ip": "172.31.66.8",
"dest_port": 5060,
"dns": null,
"ether": {
"dest_mac": "02:b6:6b:ce:60:c0",
"src_mac": "02:ba:32:ba:0e:58"
},
"event_type": "alert",
"files": null,
"flow": {
"bytes_toclient": 0,
"bytes_toserver": 464,
"pkts_toclient": 0,
"pkts_toserver": 1,
"start": "2018-02-15T00:24:07.705829+0000"
},
"flow_id": 1927842563081509,
"http": null,
"metadata": null,
"packet": "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",
"packet_info": {
"linktype": 1
},
"payload": "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",
"payload_printable": "OPTIONS sip:[email protected] SIP/2.0\r\nVia: SIP/2.0/UDP 163.172.203.168:5082;branch=z9hG4bK-1604434483;rport\r\nContent-Length: 0\r\nFrom: \"sipvicious\"<sip:[email protected]>;tag=3132646430626561313363340134303832353038313231\r\nAccept: application/sdp\r\nUser-Agent: friendly-scanner\r\nTo: \"sipvicious\"<sip:[email protected]>\r\nContact: sip:[email protected]:5082\r\nCSeq: 1 OPTIONS\r\nCall-ID: 494485907444811051970632\r\nMax-Forwards: 70\r\n\r\n",
"pcap_cnt": 637175,
"proto": "UDP",
"rdp": null,
"sip": {
"method": "OPTIONS",
"request_line": "OPTIONS sip:[email protected] SIP/2.0",
"uri": "sip:[email protected]",
"version": "SIP/2.0"
},
"smb": null,
"snmp": null,
"src_ip": "163.172.203.168",
"src_port": 5082,
"ssh": null,
"stream": 0,
"timestamp": "2018-02-15T00:24:07.705829+0000",
"tx_id": null
}
] | 79 | 1,521 |
172.31.64.4-172.31.0.2-52145-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 181, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 621307, event_type: dns, proto: UDP, dns_type: query, dns_id: 3550, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 621308, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 3550, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure.livechatinc.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure.livechatinc.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 14, dns_answers_0_rdata: secure.livechatinc.com.edgekey.net, dns_answers_1_rrname: secure.livechatinc.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 14, dns_answers_1_rdata: e2201.ksd.akamaiedge.net, dns_answers_2_rrname: e2201.ksd.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 17, dns_answers_2_rdata: 23.218.62.30, dns_grouped_A_0: 23.218.62.30, dns_grouped_CNAME_0: secure.livechatinc.com.edgekey.net, dns_grouped_CNAME_1: e2201.ksd.akamaiedge.net | false | BENIGN | false | 12:30:30.127105 | 252 | Wednesday-14-02-2018 | [] | 545 | 1,522 |
172.31.64.4-172.31.0.2-52597-53-17 | [
"flow",
"tls"
] | event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 13, flow_pkts_toclient: 19, flow_bytes_toserver: 1449, flow_bytes_toclient: 13451, flow_age: 60, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: de, tcp_tcp_flags_ts: da, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 615266, event_type: tls, proto: TCP, tls_subject: C=US, ST=New York, L=New York, O=Vimeo, LLC, CN=*.vimeo.com, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 0E:7E:09:D1:8B:FB:8B:38:51:7C:91:70:6E:A8:44:B1, tls_fingerprint: 79:9f:d0:64:38:21:f3:15:7e:92:c3:e8:fc:c5:b8:c3:bd:ce:1f:07, tls_sni: player.vimeo.com, tls_version: TLS 1.2, tls_notbefore: 2017-01-03T00:00:00, tls_notafter: 2020-03-20T12:00:00 | false | BENIGN | false | 12:30:30.127541 | 250 | Wednesday-14-02-2018 | [] | 404 | 1,523 |
172.31.64.4-172.31.0.2-55380-53-17 | [
"rdp"
] | pcap_cnt: 636998, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: hello | null | BENIGN | false | 12:30:30.127887 | 12,709 | Wednesday-14-02-2018 | [] | 47 | 1,524 |
172.31.64.4-172.31.0.2-53346-53-17 | [
"dns",
"dns"
] | pcap_cnt: 628402, event_type: dns, proto: UDP, dns_type: query, dns_id: 1135, dns_rrname: stats.g.doubleclick.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 628405, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 1135, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: stats.g.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: stats.g.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: stats.l.doubleclick.net, dns_answers_1_rrname: stats.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 209.85.203.157, dns_answers_2_rrname: stats.l.doubleclick.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 209.85.203.154, dns_answers_3_rrname: stats.l.doubleclick.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 209.85.203.155, dns_answers_4_rrname: stats.l.doubleclick.net, dns_answers_4_rrtype: A, dns_answers_4_ttl: 60, dns_answers_4_rdata: 209.85.203.156, dns_grouped_CNAME_0: stats.l.doubleclick.net, dns_grouped_A_0: 209.85.203.157, dns_grouped_A_1: 209.85.203.154, dns_grouped_A_2: 209.85.203.155, dns_grouped_A_3: 209.85.203.156 | null | BENIGN | false | 12:30:30.129140 | 179,924 | Wednesday-14-02-2018 | [] | 611 | 1,525 |
172.31.64.4-172.31.0.2-50265-53-17 | [
"flow",
"dns",
"dns"
] | event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 87, flow_bytes_toclient: 103, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 631084, event_type: dns, proto: UDP, dns_type: query, dns_id: 13676, dns_rrname: safebrowsing.googleapis.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 631085, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 13676, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing.googleapis.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing.googleapis.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 216.58.198.74, dns_grouped_A_0: 216.58.198.74 | false | BENIGN | false | 12:30:30.154351 | 13,291 | Wednesday-14-02-2018 | [] | 345 | 1,526 |