Description

Files
- .capinfos
- .dnstop
- mitm.out
- Mitm proxy interception file of http and https
- .mitm.weblog
- This is the HTTP and HTTPS web log that includes Labels. This is the preferred file for web analysis.
- This file includes a header with the columns names. There are two new columns defined by us:
- Column id: This number is unique for all the weblogs generated inside the same TCP connection. When a TCP connection is opened and several GET/POST, etc., requests are made inside it, all of them are assigned the same Id in this file.
- Column timestamp_end: This is the timestamp when the weblog ended. If you use this with the id column you can compute the total duration of the TCP connection that generated all the weblogs. Similar to the duration of a hypothetical CONNECT request if this would have been done using a proxy.
- .passivedns
- .pcap
- .rrd
- .weblogng
- WEB log of http traffic only. Generated with justsniffer
- .exe.zip
- bro
- Folder with all the bro output files
- .biargus
- Argus binary file. Bidirectional flows, 3600s of report time.
- .binetflow
- Argus text file with bidirectional flows. Report time 3600 secs.
- .uniargus
- Argus binary file. Unidirectional flows, 5s of report time.
- .uninetflow
- Argus text file with unidirectional flows. Report time 5 secs. TAB as column separator.
IP Addresses
- Infected host: 192.168.1.xx
- Default GW: 192.168.1.2
Timeline
Tue May 1 21:02:28 CEST 2018
Started normal This is the windows that is full but smaller
Last normal packet 9
Tue May 1 21:03:42 CEST 2018
Infected with 0d3019f5dfdd7ee6594aaf3ef712e86d0c207ae67e8c1a2cfb7c5e475cfec14a
Wed May 2 07:56:53 CEST 2018
Normal actions Last packet before doing normal actions by hand:
2132 04:00:54.354418 IP6 fe80::353e:6fce:ee32:1a73.51389 > ff02::c.1900: UDP, length 146
We did a lot of normal, google eemail, youtube, download docuemnts, ping www.otro.com from cmd.exe, and google drive.
Fri May 4 23:45:27 CEST 2018
Power it off
Disclaimer
These files were generated in the Stratosphere Lab as part of the Malware Capture Facility Project in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real botnet traffic and to generate labeled netflows files. Any question feel free to contact us: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz
You are free to use these files as long as you reference this project and the authors as follows: Garcia, Sebastian. Malware Capture Facility Project. Retrieved from https://stratosphereips.org