<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Suspicious traffic from internal to External IP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-traffic-from-internal-to-external-ip/m-p/305924#M79510</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Recently on my SIEM console. I could observe the web traffic from the internal host machine towards the blacklisted IP over the port 443. Alert was flagged by the PaSeries (Palo alto firewall). Two events I have observed&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1)&amp;nbsp;&amp;nbsp;CryptoMiner.Gen Malicious Script Detection&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2)&lt;/SPAN&gt;Traffic End&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;First event contains below information&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Application=web-browsing&lt;/P&gt;&lt;P&gt;proto=tcp|action=reset-both&lt;/P&gt;&lt;P&gt;ThreatID=CryptoMiner.Gen Malicious Script Detection(18024)&lt;/P&gt;&lt;P&gt;URLCategory=insufficient-content&lt;/P&gt;&lt;P&gt;Flags=0x81502000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Second event contains below information&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Application=web-browsing&lt;/P&gt;&lt;P&gt;proto=tcp|action=allow&lt;/P&gt;&lt;P&gt;URLCategory=insufficient-content&lt;/P&gt;&lt;P&gt;totalBytes=25865|dstBytes=24296|srcBytes=1569|totalPackets=27&lt;/P&gt;&lt;P&gt;Flags=0x1500010.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on the above events I assume , From the web browser this traffic would have been generated because it was mentioned as (Application=web-browsing) and the threat Id contains&amp;nbsp;CryptoMiner.Gen Malicious Script Detection , probably some js script will be present in browser which may cause this traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On first event&amp;nbsp;&lt;SPAN&gt;CryptoMiner.Gen Malicious Script Detection, action is mentioned as&amp;nbsp;reset-both. it means that connection was unsuccessful ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But on second event&amp;nbsp;Traffic End, action is mentioned as allow but on my payload i am unable to view Session End Reason&amp;nbsp;field to determine the actual reason of traffic end.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since I am new to analyse the paloalto&amp;nbsp; logs. Please advise do i need to take any action for the above events.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jan 2020 04:49:57 GMT</pubDate>
    <dc:creator>VyasarVenkat</dc:creator>
    <dc:date>2020-01-08T04:49:57Z</dc:date>
    <item>
      <title>Suspicious traffic from internal to External IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-traffic-from-internal-to-external-ip/m-p/305924#M79510</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Recently on my SIEM console. I could observe the web traffic from the internal host machine towards the blacklisted IP over the port 443. Alert was flagged by the PaSeries (Palo alto firewall). Two events I have observed&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1)&amp;nbsp;&amp;nbsp;CryptoMiner.Gen Malicious Script Detection&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2)&lt;/SPAN&gt;Traffic End&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;First event contains below information&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Application=web-browsing&lt;/P&gt;&lt;P&gt;proto=tcp|action=reset-both&lt;/P&gt;&lt;P&gt;ThreatID=CryptoMiner.Gen Malicious Script Detection(18024)&lt;/P&gt;&lt;P&gt;URLCategory=insufficient-content&lt;/P&gt;&lt;P&gt;Flags=0x81502000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Second event contains below information&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Application=web-browsing&lt;/P&gt;&lt;P&gt;proto=tcp|action=allow&lt;/P&gt;&lt;P&gt;URLCategory=insufficient-content&lt;/P&gt;&lt;P&gt;totalBytes=25865|dstBytes=24296|srcBytes=1569|totalPackets=27&lt;/P&gt;&lt;P&gt;Flags=0x1500010.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on the above events I assume , From the web browser this traffic would have been generated because it was mentioned as (Application=web-browsing) and the threat Id contains&amp;nbsp;CryptoMiner.Gen Malicious Script Detection , probably some js script will be present in browser which may cause this traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On first event&amp;nbsp;&lt;SPAN&gt;CryptoMiner.Gen Malicious Script Detection, action is mentioned as&amp;nbsp;reset-both. it means that connection was unsuccessful ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But on second event&amp;nbsp;Traffic End, action is mentioned as allow but on my payload i am unable to view Session End Reason&amp;nbsp;field to determine the actual reason of traffic end.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since I am new to analyse the paloalto&amp;nbsp; logs. Please advise do i need to take any action for the above events.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 04:49:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-traffic-from-internal-to-external-ip/m-p/305924#M79510</guid>
      <dc:creator>VyasarVenkat</dc:creator>
      <dc:date>2020-01-08T04:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious traffic from internal to External IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-traffic-from-internal-to-external-ip/m-p/305997#M79526</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Reset-both means that the PAN send a rest packet to both the server and the client to terminate the connection, so yes the connection was successful but the PAN saw bad stuff and reset the connections. Also check the 'Type or Log Subtype', depends on which log you are looking at, column as it often also has useful info.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/explore/explore-schema-reference/long-field-descriptions/panw-fields/long-panw-session_end_reason.html" target="_blank"&gt;https://docs.paloaltonetworks.com/cortex/explore/explore-schema-reference/long-field-descriptions/panw-fields/long-panw-session_end_reason.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 15:25:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-traffic-from-internal-to-external-ip/m-p/305997#M79526</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-01-08T15:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious traffic from internal to External IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-traffic-from-internal-to-external-ip/m-p/306063#M79539</link>
      <description>&lt;P&gt;Thank you for the clarification&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 03:10:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-traffic-from-internal-to-external-ip/m-p/306063#M79539</guid>
      <dc:creator>VyasarVenkat</dc:creator>
      <dc:date>2020-01-09T03:10:09Z</dc:date>
    </item>
  </channel>
</rss>

